Sciweavers

777 search results - page 67 / 156
» Secure broadcasting in large networks
Sort
View
SASN
2003
ACM
15 years 3 months ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
INFOCOM
2008
IEEE
15 years 4 months ago
Reliability Gain of Network Coding in Lossy Wireless Networks
The capacity gain of network coding has been extensively studied in wired and wireless networks. Recently, it has been shown that network coding improves network reliability by re...
Majid Ghaderi, Donald F. Towsley, James F. Kurose
ANCS
2008
ACM
14 years 12 months ago
Towards effective network algorithms on multi-core network processors
To build high-performance network devices with holistic security protection, a large number of algorithms have been proposed. However, multi-core implementation of the existing al...
Yaxuan Qi, Zongwei Zhou, Baohua Yang, Fei He, Yibo...
SECON
2007
IEEE
15 years 4 months ago
Privacy Preserving Communication in MANETs
Abstract— Mobile ad hoc networks often support sensitive applications. These applications may require that users’ identity, location, and correspondents be kept secret. This is...
Heesook Choi, Patrick Drew McDaniel, Thomas F. La ...
USS
2008
15 years 5 days ago
VoteBox: A Tamper-evident, Verifiable Electronic Voting System
Commercial electronic voting systems have experienced many high-profile software, hardware, and usability failures in real elections. While it is tempting to abandon electronic vo...
Daniel Sandler, Kyle Derr, Dan S. Wallach