Sciweavers

688 search results - page 81 / 138
» Network Coding Protocols for Secret Key Distribution
Sort
View
PODC
2010
ACM
15 years 3 months ago
Meeting the deadline: on the complexity of fault-tolerant continuous gossip
In this paper, we introduce the problem of Continuous Gossip in which rumors are continually and dynamically injected throughout the network. Each rumor has a deadline, and the go...
Chryssis Georgiou, Seth Gilbert, Dariusz R. Kowals...
PERCOM
2005
ACM
16 years 4 months ago
Secure Routing and Intrusion Detection in Ad Hoc Networks
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept i...
Anand Patwardhan, Jim Parker, Anupam Joshi, Michae...
AINA
2010
IEEE
15 years 9 months ago
Developing Distributed Reasoning-Based Applications for the Semantic Web
—In order for Semantic Web applications to be successful a key component should be their ability to take advantage of rich content descriptions in meaningful ways. Reasoning cons...
Dimitrios A. Koutsomitropoulos, Georgia D. Solomou...
CODASPY
2012
14 years 11 days ago
Towards end-to-end secure content storage and delivery with public cloud
Recent years have witnessed the trend of leveraging cloudbased services for large scale content storage, processing, and distribution. Security and privacy are among top concerns ...
Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin W...
WAC
2004
Springer
15 years 10 months ago
A Metabolic Approach to Protocol Resilience
The goal of this research is to create robust execution circuits for communication software which can distribute over a network and which continues to provide its service despite p...
Christian F. Tschudin, Lidia Yamamoto