Sciweavers

1692 search results - page 195 / 339
» Practical, distributed network coordinates
Sort
View
108
Voted
PRDC
2007
IEEE
15 years 8 months ago
Intrusion Tolerance in Wireless Environments: An Experimental Evaluation
This paper presents a study on the performance of intrusion-tolerant protocols in wireless LANs. The protocols are evaluated in several different environmental settings, and also ...
Henrique Moniz, Nuno Ferreira Neves, Miguel Correi...
INFOCOM
2011
IEEE
14 years 5 months ago
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
—Recently, there has been great interest in physical layer security techniques that exploit the randomness of wireless channels for securely extracting cryptographic keys. Severa...
Qian Wang, Hai Su, Kui Ren, Kwangjo Kim
VECPAR
2004
Springer
15 years 7 months ago
Data Management in Large-Scale P2P Systems
Peer-to-peer (P2P) computing offers new opportunities for building highly distributed data systems. Unlike client-server computing, P2P can operate without central coordination and...
Patrick Valduriez, Esther Pacitti
MIDDLEWARE
2005
Springer
15 years 7 months ago
Composite Subscriptions in Content-Based Publish/Subscribe Systems
Distributed publish/subscribe systems are naturally suited for processing events in distributed systems. However, support for expressing patterns about disparate events and algorit...
Guoli Li, Hans-Arno Jacobsen
ICNP
2007
IEEE
15 years 8 months ago
Design and Implementation of Cross-Domain Cooperative Firewall
Security and privacy are two major concerns in supporting roaming users across administrative domains. In current practices, a roaming user often uses encrypted tunnels, e.g., Virt...
Jerry Cheng, Hao Yang, Starsky H. Y. Wong, Petros ...