Sciweavers

1573 search results - page 46 / 315
» Reliable Communication in Overlay Networks
Sort
View
CN
2006
79views more  CN 2006»
14 years 9 months ago
Understanding when location-hiding using overlay networks is feasible
Overlay networks (proxy networks) have been used as a communication infrastructure to allow applications to communicate with users without revealing their IP addresses. Such proxy...
Ju Wang, Andrew A. Chien
GLOBECOM
2007
IEEE
15 years 4 months ago
Discovery of In-Band Streaming Services in Peer-to-Peer Overlays
Peer-to-peer overlays can be used for service discovery over a global network fabric. We describe and evaluate a new service indexing mechanism for in-band streaming services such ...
John Buford, Angela Wang, Xiaojun Hei, Yong Liu, K...
ICC
2009
IEEE
107views Communications» more  ICC 2009»
15 years 4 months ago
Towards a Denial-of-Service Resilient Design of Complex IPsec Overlays
— By monitoring the exchanged IPsec traffic an adversary can usually easily discover the layout of virtual private networks (VPNs). Of even worse extend is the disclosure if com...
Michael Brinkmeier, Michael Rossberg, Guenter Scha...
ICC
2007
IEEE
105views Communications» more  ICC 2007»
15 years 4 months ago
Wheel of Trust: A Secure Framework for Overlay-Based Services
— The recent advances of distributed hash tables (DHTs) facilitate the development of highly scalable and robust network applications and services. However, with applications and...
Guor-Huar Lu, Zhi-Li Zhang
DIALM
1999
ACM
113views Algorithms» more  DIALM 1999»
15 years 2 months ago
Flooding for reliable multicast in multi-hop ad hoc networks
Ad hoc networks are gaining popularity as a result of advances in smaller, more versatile and powerful mobile computing devices. The distinguishing feature of these networks is the...
Christopher Ho, Katia Obraczka, Gene Tsudik, Kumar...