Sciweavers

277 search results - page 10 / 56
» Secure Aggregation in Large Scale Overlay Networks
Sort
View
DEBS
2008
ACM
14 years 10 months ago
Availability models for underlay aware overlay networks
Availability of an overlay network is a necessary condition for event delivery in event based systems. The availability of the overlay links depends on the underlying physical net...
Madhu Kumar SD, Umesh Bellur
SIGOPSE
2004
ACM
15 years 2 months ago
Defending against eclipse attacks on overlay networks
Overlay networks are widely used to deploy functionality at edge nodes without changing network routers. Each node in an overlay network maintains pointers to a set of neighbor no...
Atul Singh, Miguel Castro, Peter Druschel, Antony ...
INFOCOM
2012
IEEE
12 years 12 months ago
Locating malicious nodes for data aggregation in wireless networks
—Data aggregation, as a primitive communication task in wireless networks, can reduce the communication complexity. However, in-network aggregation usually brings an unavoidable ...
XiaoHua Xu, Qian Wang, Jiannong Cao, Peng-Jun Wan,...
APNOMS
2006
Springer
15 years 1 months ago
A Proposal of Large-Scale Traffic Monitoring System Using Flow Concentrators
In a large-scale backbone networks, the traffic monitoring system needs to receive a large volume of flow records, so if a single central collecting process is used, it might not b...
Atsushi Kobayashi, Daisuke Matsubara, Shingo Kimur...
TCSV
2008
298views more  TCSV 2008»
14 years 9 months ago
TrustStream: A Secure and Scalable Architecture for Large-Scale Internet Media Streaming
Abstract--To effectively address the explosive growth of multimedia applications over the Internet, a large-scale media streaming system has to fully take into account the issues o...
Hao Yin, Chuang Lin, Qian Zhang, Zhijia Chen, Dape...