Sciweavers

6432 search results - page 1219 / 1287
» Classic Mechanism Design
Sort
View
WPES
2006
ACM
15 years 6 months ago
A privacy-preserving interdomain audit framework
Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborat...
Adam J. Lee, Parisa Tabriz, Nikita Borisov
123
Voted
WPES
2006
ACM
15 years 6 months ago
Nonesuch: a mix network with sender unobservability
Oblivious submission to anonymity systems is a process by which a message may be submitted in such a way that neither the anonymity network nor a global passive adversary may dete...
Thomas S. Heydt-Benjamin, Andrei Serjantov, Beness...
100
Voted
WS
2006
ACM
15 years 6 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton
133
Voted
AINA
2005
IEEE
15 years 6 months ago
Sensor Inter-Vehicle Communication for Safer Highways
In this paper we present a sensor inter-vehicle communication protocol based on geographical routing. Sensors installed in cars continuously gather important information about: ai...
Mimoza Durresi, Arjan Durresi, Leonard Barolli
ICDCS
2005
IEEE
15 years 6 months ago
Timer Interaction in Route Flap Damping
Route Flap Damping is a mechanism generally used in network routing protocols. Its goal is to limit the global impact of unstable routes by temporarily suppressing routes with rap...
Beichuan Zhang, Dan Pei, Daniel Massey, Lixia Zhan...
« Prev « First page 1219 / 1287 Last » Next »