Sciweavers

1630 search results - page 54 / 326
» Secure Overlay Network Design
Sort
View
NSDI
2004
14 years 11 months ago
OverQoS: An Overlay Based Architecture for Enhancing Internet QoS
This paper describes the design, implementation, and experimental evaluation of OverQoS, an overlay-based architecture for enhancing the best-effort service of today's Intern...
Lakshminarayanan Subramanian, Ion Stoica, Hari Bal...
ICDCS
2006
IEEE
15 years 3 months ago
A Semantic Overlay for Self- Peer-to-Peer Publish/Subscribe
Publish/Subscribe systems provide a useful platform for delivering data (events) from publishers to subscribers in an anonymous fashion in distributed networks. In this paper, we ...
Emmanuelle Anceaume, Maria Gradinariu, Ajoy Kumar ...
NSDI
2004
14 years 11 months ago
Efficient Routing for Peer-to-Peer Overlays
Most current peer-to-peer lookup schemes keep a small amount of routing state per node, typically logarithmic in the number of overlay nodes. This design assumes that routing info...
Anjali Gupta, Barbara Liskov, Rodrigo Rodrigues
P2P
2007
IEEE
165views Communications» more  P2P 2007»
15 years 4 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
COMCOM
2007
149views more  COMCOM 2007»
14 years 9 months ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao