Sciweavers

4045 search results - page 330 / 809
» Special Section on Parallel Distributed Computing and Networ...
Sort
View
164
Voted
CONCUR
2010
Springer
15 years 3 months ago
Trust in Anonymity Networks
Anonymity is a security property of paramount importance, as we move steadily towards a wired, online community. Its import touches upon subjects as different as eGovernance, eBusi...
Vladimiro Sassone, Sardaouna Hamadou, Mu Yang
129
Voted
ICDCS
2010
IEEE
15 years 7 months ago
LT Network Codes
This paper proposes LTNC, a new recoding algorithm to build low complexity network codes. At the core of LTNC is a decentralized version of LT codes that allows the use of fast be...
Mary-Luc Champel, Kévin Huguenin, Anne-Mari...
143
Voted
ICDCSW
2005
IEEE
15 years 9 months ago
Increasing Attack Resiliency of Wireless Ad Hoc and Sensor Networks
An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
Harald Vogt
121
Voted
GCC
2005
Springer
15 years 9 months ago
Dynamic Zone-Balancing of Topology-Aware Peer-to-Peer Networks
Building a topology-aware peer-to-peer overlay network can bring many advantages, such as providing locality-aware connectivity and reducing routing path length. While its benefit...
Gang Wu, Jianli Liu
100
Voted
ICDCS
2008
IEEE
15 years 10 months ago
Securing Wireless Data Networks against Eavesdropping using Smart Antennas
In this paper, we focus on securing communication over wireless data networks from malicious eavesdroppers, using smart antennas. While conventional cryptography based approaches ...
Sriram Lakshmanan, Cheng-Lin Tsao, Raghupathy Siva...