Sciweavers

1813 search results - page 88 / 363
» Mechanism Design on Trust Networks
Sort
View
CORR
2002
Springer
156views Education» more  CORR 2002»
14 years 11 months ago
Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design
Despite recent excitement generated by the peer-to-peer (P2P) paradigm and the surprisingly rapid deployment of some P2P applications, there are few quantitative evaluations of P2...
Matei Ripeanu, Ian T. Foster, Adriana Iamnitchi
PE
2006
Springer
193views Optimization» more  PE 2006»
14 years 11 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
INFOCOM
2006
IEEE
15 years 6 months ago
Establishing Pair-Wise Keys in Heterogeneous Sensor Networks
— Many applications that make use of sensor networks require secure communication. Because asymmetric-key solutions are difficult to implement in such a resource-constrained env...
Patrick Traynor, Heesook Choi, Guohong Cao, Sencun...
ADVCS
2008
140views more  ADVCS 2008»
15 years 1 days ago
Reputation for Innovating Social Networks
Reputation is a fundamental instrument of partner selection. Developed within the domain of electronic auctions, reputation technology is being been imported into other applicatio...
Rosaria Conte, Mario Paolucci, Jordi Sabater-Mir
COMCOM
2008
138views more  COMCOM 2008»
15 years 3 hour ago
Secure content access and replication in pure P2P networks
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolerance), a crucial requirement is to guarantee basic security properties, such as ...
Esther Palomar, Juan M. Estévez-Tapiador, J...