Sciweavers

824 search results - page 158 / 165
» Deployment of Public-Key Infrastructure in Wireless Data Net...
Sort
View
CLUSTER
2004
IEEE
14 years 9 months ago
Seamless Access to Decentralized Storage Services in Computational Grids via a Virtual File System
This paper describes a novel technique for establishing a virtual file system that allows data to be transferred user-transparently and on-demand across computing and storage serve...
Renato J. O. Figueiredo, Nirav H. Kapadia, Jos&eac...
MOBISYS
2009
ACM
15 years 10 months ago
SPATE: small-group PKI-less authenticated trust establishment
Establishing trust between a group of individuals remains a difficult problem. Prior works assume trusted infrastructure, require an individual to trust unknown entities, or provi...
Yue-Hsun Lin, Ahren Studer, Hsu-Chun Hsiao, Jonath...
IFIP
2005
Springer
15 years 3 months ago
Global Internet Routing Forensics: Validation of BGP Paths Using ICMP Traceback
Nearly all network applications rely on the global Internet routing infrastructure to compute routes and deliver packets. Unfortunately, false Internet routes can be maliciously in...
Eunjong Kim, Daniel Massey, Indrajit Ray
SENSYS
2003
ACM
15 years 2 months ago
CODA: congestion detection and avoidance in sensor networks
Event-driven sensor networks operate under an idle or light load and then suddenly become active in response to a detected or monitored event. The transport of event impulses is l...
Chieh-Yih Wan, Shane B. Eisenman, Andrew T. Campbe...
IMC
2010
ACM
14 years 7 months ago
Performance comparison of 3G and metro-scale WiFi for vehicular network access
We perform a head-to-head comparison of the performance characteristics of a 3G network operated by a nation-wide provider and a metro-scale WiFi network operated by a commercial ...
Pralhad Deshpande, Xiaoxiao Hou, Samir R. Das