Sciweavers

5107 search results - page 568 / 1022
» Design Issue Of ECTST
Sort
View
124
Voted
SP
2006
IEEE
15 years 11 months ago
Locating Hidden Servers
Hidden services were deployed on the Tor anonymous communication network in 2004. Announced properties include server resistance to distributed DoS. Both the EFF and Reporters Wit...
Lasse Øverlier, Paul F. Syverson
146
Voted
SRDS
2006
IEEE
15 years 11 months ago
Generalised Repair for Overlay Networks
We present and evaluate a generic approach to the repair of overlay networks which identifies general principles of overlay repair and embodies these as a reusable service. At th...
Barry Porter, François Taïani, Geoff C...
148
Voted
SUTC
2006
IEEE
15 years 11 months ago
Power-aware Node Deployment in Wireless Sensor Networks
Sensor networks have attracted intensive interests due to its extendable capability. In this paper, we attempt to answer a fundamental but practical question:” how should we dep...
Yunhuai Liu, Hoilun Ngan, Lionel M. Ni
WETICE
2006
IEEE
15 years 11 months ago
A Hybrid P2P Protocol for Real-Time Collaboration
Peer-to-Peer architecture is currently an attractive solution for facilitating the use of collaboration software without any server. Multicasting is usually proposed for group com...
Dewan Tanvir Ahmed, Shervin Shirmohammadi
ADHOCNOW
2006
Springer
15 years 11 months ago
Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks
Recently, identity-based cryptographic (IBC) schemes have been considered to secure mobile ad hoc networks (MANETs) due to their efficient key management properties. However, propo...
Katrin Hoeper, Guang Gong