Sciweavers

1647 search results - page 231 / 330
» Distributing private data in challenged network environments
Sort
View
IJISEC
2006
119views more  IJISEC 2006»
15 years 5 months ago
A monitoring system for detecting repeated packets with applications to computer worms
Abstract We present a monitoring system which detects repeated packets in network traffic, and has applications including detecting computer worms. It uses Bloom filters with count...
Paul C. van Oorschot, Jean-Marc Robert, Miguel Var...
IEEEARES
2006
IEEE
15 years 11 months ago
Replication Strategies for Reliable Decentralised Storage
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the netwo...
Matthew Leslie, Jim Davies, Todd Huffman
DEBS
2003
ACM
15 years 10 months ago
Looking into the past: enhancing mobile publish/subscribe middleware
Publish/subscribe (pub/sub) middleware facilitates loosely coupled cooperation and fits well the needs of spontaneous, ad-hoc interaction. However, newly started mobile applicati...
Mariano Cilia, Ludger Fiege, C. Haul, Andreas Zeid...
JNW
2006
145views more  JNW 2006»
15 years 5 months ago
A Comparison of Replication Strategies for Reliable Decentralised Storage
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the network...
Matthew Leslie, Jim Davies, Todd Huffman
159
Voted
SASN
2006
ACM
15 years 11 months ago
Attacker traceback with cross-layer monitoring in wireless multi-hop networks
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to its limited network/host resources. Attacker traceback is a promi...
Yongjin Kim, Ahmed Helmy