Sciweavers

317 search results - page 32 / 64
» Practical Key Distribution Schemes for Channel Protection
Sort
View
ICDCS
2010
IEEE
15 years 1 months ago
Practical Robust Communication in DHTs Tolerating a Byzantine Adversary
—There are several analytical results on distributed hash tables (DHTs) that can tolerate Byzantine faults. Unfortunately, in such systems, operations such as data retrieval and ...
Maxwell Young, Aniket Kate, Ian Goldberg, Martin K...
CIC
2006
121views Communications» more  CIC 2006»
14 years 11 months ago
Performance Studies of a Coding Scheme for a Slepian-Wolf Source Network
- We investigate the simplest Slepian-Wolf source network, consisting of an information source correlated with a second source used as a side-information for the decoder but not th...
Azizuddin Abdul Aziz, John C. Kieffer
ICIP
2007
IEEE
15 years 4 months ago
Distributed Coding of Multiresolution Omnidirectional Images
This paper addresses the problem of compact representation of a 3D scene, captured by distributed omnidirectional cameras. As the images from the sensors are likely to be correlat...
Vijayaraghavan Thirumalai, Ivana Tosic, Pascal Fro...
CCS
2010
ACM
14 years 11 months ago
Securing wireless sensor networks against large-scale node capture attacks
Securing wireless sensor networks against node capture is a challenging task. All well-known random key pre-distribution systems, including the Eschenauer and Gligor's pionee...
Tuan Manh Vu, Reihaneh Safavi-Naini, Carey William...
CCS
2000
ACM
15 years 2 months ago
Implementing a distributed firewall
Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does ...
Sotiris Ioannidis, Angelos D. Keromytis, Steven M....