Sciweavers

5079 search results - page 143 / 1016
» Hidden-Action in Network Routing
Sort
View
76
Voted
ICNP
2005
IEEE
15 years 3 months ago
Z-Ring: Fast Prefix Routing via a Low Maintenance Membership Protocol
In this paper, we introduce Z-Ring, a fast prefix routing protocol for peer-to-peer overlay networks. Z-Ring incorporates cost-efficient membership protocol to achieve fast routin...
Qiao Lian, Wei Chen, Zheng Zhang, Shaomei Wu, Ben ...
ICPPW
2003
IEEE
15 years 3 months ago
Trusting Routers and Relays in Ad hoc Networks
The current generation of ad hoc networks relies on other nodes in the network for routing information and for routing the packets. These networks are based on the fundamental ass...
Prashant Dewan, Partha Dasgupta
93
Voted
P2P
2007
IEEE
165views Communications» more  P2P 2007»
15 years 4 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
IWCMC
2009
ACM
15 years 4 months ago
Using link-layer broadcast to improve scalable source routing
Scalable source routing (SSR) is a network layer routing protocol that provides services that are similar to those of structured peer-to-peer overlays. In this paper, we describe ...
Pengfei Di, Thomas Fuhrmann
MOBISYS
2003
ACM
15 years 9 months ago
System Services for Ad-Hoc Routing: Architecture, Implementation and Experiences
This work explores several system issues regarding the design and implementation of routing protocols for ad-hoc wireless networks. We examine the routing architecture in current ...
Vikas Kawadia, Yongguang Zhang, Binita Gupta