Sciweavers

1630 search results - page 51 / 326
» Secure Overlay Network Design
Sort
View
ICPADS
2008
IEEE
15 years 4 months ago
GROUP: Dual-Overlay State Management for P2P NVE
Peer-to-peer (P2P) architectures have recently become a popular design choice to build scalable Networked Virtual Environments (NVEs). While P2P architectures offer better scalabi...
Eliya Buyukkaya, Maha Abdallah, Romain Cavagna, Sh...
IWQOS
2004
Springer
15 years 3 months ago
Robust communications for sensor networks in hostile environments
— Clustering sensor nodes increases the scalability and energy efficiency of communications among them. In hostile environments, unexpected failures or attacks on cluster heads ...
Ossama Younis, Sonia Fahmy, Paolo Santi
NSDI
2007
15 years 2 days ago
X-Trace: A Pervasive Network Tracing Framework
Modern Internet systems often combine different applications (e.g., DNS, web, and database), span different administrative domains, and function in the context of network mechanis...
Rodrigo Fonseca, George Porter, Randy H. Katz, Sco...
SPW
2004
Springer
15 years 3 months ago
Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System
In this paper we describe Turtle, a peer-to-peer architecture for safe sharing of sensitive data. The truly revolutionary aspect of Turtle rests in its novel way of dealing with t...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
IPCCC
2007
IEEE
15 years 4 months ago
Towards Survivable and Secure Wireless Sensor Networks
– In this paper, we present a comprehensive study on the design of secure and survivable wireless sensor networks (WSNs). Our goal is to develop a framework that provides both se...
Yi Qian, Kejie Lu, David Tipper