Sciweavers

39 search results - page 3 / 8
» Bifrost : A Novel Anonymous Communication System with DHT
Sort
View
P2P
2007
IEEE
165views Communications» more  P2P 2007»
14 years 15 days ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
CNSR
2004
IEEE
218views Communications» more  CNSR 2004»
13 years 10 months ago
CSN: A Network Protocol for Serving Dynamic Queries in Large-Scale Wireless Sensor Networks
A fundamental problem that confronts future applications of sensor networks is how to efficiently locate the sensor node that stores a particular data item. It is known that distr...
Muneeb Ali, Zartash Afzal Uzmi
ESORICS
2008
Springer
13 years 8 months ago
A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks
The ubiquitous proliferation of mobile devices has given rise to novel user-centric application and services. In current mobile systems, users gain access to remote service provide...
Claudio Agostino Ardagna, Angelos Stavrou, Sushil ...
P2P
2008
IEEE
14 years 19 days ago
Flexible Routing in Grouped DHTs
In most DHTs proposed so far, all nodes are assumed to be homogeneous, and all messages are routed using a common algorithm. In practice, however, nodes in large-scale systems mig...
Yiming Zhang, Dongsheng Li, Lei Chen 0002, Xicheng...
JNW
2006
145views more  JNW 2006»
13 years 6 months ago
A Comparison of Replication Strategies for Reliable Decentralised Storage
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the network...
Matthew Leslie, Jim Davies, Todd Huffman