Sciweavers

1630 search results - page 158 / 326
» Secure Overlay Network Design
Sort
View
92
Voted
ISICT
2003
14 years 11 months ago
Analysis of a mobile communication security protocol
: Cryptographic protocols are used to achieve secure communication over insecure networks. Weaknesses in such protocols are hard to identify, as they can be the result of subtle de...
Tom Coffey, Reiner Dojen
ICPP
2008
IEEE
15 years 4 months ago
On the Reliability of Large-Scale Distributed Systems A Topological View
In large-scale, self-organized and distributed systems, such as peer-to-peer (P2P) overlays and wireless sensor networks (WSN), a small proportion of nodes are likely to be more c...
Yuan He, Hao Ren, Yunhao Liu, Baijian Yang
IPPS
2006
IEEE
15 years 4 months ago
Linyphi: an IPv6-compatible implementation of SSR
Scalable Source Routing (SSR) is a self-organizing routing protocol designed for supporting peer-to-peer applications. It is especially suited for networks that do not have a well...
Pengfei Di, Massimiliano Marcon, Thomas Fuhrmann
GIR
2006
ACM
15 years 4 months ago
Range-capable Distributed Hash Tables
In this paper, we present a novel indexing data structure called RDHT (Range capable Distributed Hash Table) derived from skip lists and specifically designed for storing and retr...
Alessandro Soro, Cristian Lai
PODS
2006
ACM
96views Database» more  PODS 2006»
15 years 10 months ago
Efficient gossip-based aggregate computation
Recently, there has been a growing interest in gossip-based protocols that employ randomized communication to ensure robust information dissemination. In this paper, we present a ...
Srinivas R. Kashyap, Supratim Deb, K. V. M. Naidu,...