Sciweavers

537 search results - page 62 / 108
» Buy-at-Bulk Network Design with Protection
Sort
View
80
Voted
HICSS
2005
IEEE
86views Biometrics» more  HICSS 2005»
15 years 4 months ago
Look-Ahead Routing Reduces Wrong Turns in Freenet-Style Peer-to-Peer Systems
Peer-to-Peer protocols and applications have drawn much attention. Freenet is a groundbreaking Peer-to-Peer system that protects the anonymity of information producers, consumers,...
Jens Mache, Eric Anholt, Valentina Grigoreanu, Tim...
85
Voted
STORAGESS
2005
ACM
15 years 4 months ago
Toward securing untrusted storage without public-key operations
Adding security capabilities to shared, remote and untrusted storage file systems leads to performance degradation that limits their use. Public-key cryptographic primitives, wid...
Dalit Naor, Amir Shenhav, Avishai Wool
SP
2006
IEEE
15 years 4 months ago
Locating Hidden Servers
Hidden services were deployed on the Tor anonymous communication network in 2004. Announced properties include server resistance to distributed DoS. Both the EFF and Reporters Wit...
Lasse Øverlier, Paul F. Syverson
100
Voted
ESAS
2005
Springer
15 years 4 months ago
SKiMPy: A Simple Key Management Protocol for MANETs in Emergency and Rescue Operations
Mobile ad-hoc networks (MANETs) provide the technical platform for efficient information sharing in emergency and rescue operations. Some the data present on the scene is highly c...
Matija Puzar, Jon Andersson, Thomas Plagemann, Yve...
93
Voted
NOSSDAV
2005
Springer
15 years 4 months ago
Adjusting forward error correction with quality scaling for streaming MPEG
Packet loss can severely impact streaming video quality. Repair techniques protect streaming video from packet loss but at the price of a reduced effective transmission rate when...
Huahui Wu, Mark Claypool, Robert E. Kinicki