Sciweavers

1630 search results - page 19 / 326
» Secure Overlay Network Design
Sort
View
SASO
2007
IEEE
15 years 11 months ago
STORM: A Secure Overlay for P2P Reputation Management
A fundamental problem that confronts decentralized reputation systems is the design of efficient, secure and incentive-compatible mechanisms to gather trust information despite m...
Aina Ravoaja, Emmanuelle Anceaume
ICWMC
2006
IEEE
15 years 11 months ago
Design and Evaluation of eTIMIP - an Overlay Micro-Mobility Architecture based on TIMIP
All the proposed IP mobility protocols assume that the mobile nodes always have a mobility-aware IP stack. On the other hand, efficient micro-mobility solutions entail specific to...
Pedro Vale Estrela, Teresa Maria Vazão, M&a...
AICT
2006
IEEE
15 years 11 months ago
Recipient Anonymity in a Structured Overlay
An open problem in structured overlay networks is related to the anonymity to be provided to recipients, namely, those nodes who respond to request messages. Such a feature is of ...
Giuseppe Ciaccio
IPTPS
2004
Springer
15 years 10 months ago
P6P: A Peer-to-Peer Approach to Internet Infrastructure
Abstract— P6P is a new, incrementally deployable networking infrastructure that resolves the growing tensions between the Internet routing infrastructure and the end sites of the...
Lidong Zhou, Robbert van Renesse
ICPADS
2007
IEEE
15 years 11 months ago
A forwarding model for Voronoi-based Overlay Network
One recent approach to build highly scalable and robust networked virtual environments (NVEs) is by using peer-to-peer overlay networks. Voronoi-based Overlay Network (VON) has be...
Jui-Fa Chen, Wei-Chuan Lin, Tsu-Han Chen, Shun-Yun...