Sciweavers

337 search results - page 21 / 68
» Attack Resiliency of Network Topologies
Sort
View
PET
2010
Springer
15 years 2 months ago
Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks
Abstract. Low-latency anonymous communication networks require padding to resist timing analysis attacks, and dependent link padding has been proven to prevent these attacks with m...
Claudia Díaz, Steven J. Murdoch, Carmela Tr...
IJSN
2007
96views more  IJSN 2007»
14 years 10 months ago
On pairwise connectivity of wireless multihop networks
This paper experimentally investigates the service availability of wireless multihop networks based on the following two metrics: average pairwise connectivity and pairwise connec...
Fangting Sun, Mark A. Shayman
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
15 years 5 months ago
Pushback for Overlay Networks: Protecting Against Malicious Insiders
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although resilient to external Denial of Service attacks, overlay networks can be render...
Angelos Stavrou, Michael E. Locasto, Angelos D. Ke...
ICNS
2009
IEEE
14 years 8 months ago
HGRID: Fault Tolerant, Log2N Resource Management for Grids
Grid Resource Discovery Service is currently a very important focus of research. We propose a scheme that presents essential characteristics for efficient, self-configuring and fau...
Antonia Gallardo, Kana Sanjeevan, Luis Díaz...
NCA
2007
IEEE
15 years 5 months ago
Decoupled Quorum-Based Byzantine-Resilient Coordination in Open Distributed Systems
Open distributed systems are typically composed by an unknown number of processes running in heterogeneous hosts. Their communication often requires tolerance to temporary disconn...
Alysson Neves Bessani, Miguel Correia, Joni da Sil...