Sciweavers

182 search results - page 20 / 37
» Survey on anonymous communications in computer networks
Sort
View
85
Voted
TCS
2008
14 years 9 months ago
Efficient corona training protocols for sensor networks
Phenomenal advances in nano-technology and packaging have made it possible to develop miniaturized low-power devices that integrate sensing, special-purpose computing, and wireles...
Alan A. Bertossi, Stephan Olariu, Maria Cristina P...
JCP
2008
126views more  JCP 2008»
14 years 9 months ago
Content-Based Computer Simulation of a Networking Course: An Assessment
This paper presents a successful lab simulation experience to teach signal modulation and demodulation concepts in communication and computer networks to computer science and compu...
Giti Javidi, Ehsan Sheybani
INFOCOM
2012
IEEE
13 years 2 days ago
Extensive analysis and large-scale empirical evaluation of tor bridge discovery
Abstract—Tor is a well-known low-latency anonymous communication system that is able to bypass Internet censorship. However, publicly announced Tor routers are being blocked by v...
Zhen Ling, Junzhou Luo, Wei Yu, Ming Yang, Xinwen ...
83
Voted
CORR
2012
Springer
182views Education» more  CORR 2012»
13 years 5 months ago
Organizing the Aggregate: Languages for Spatial Computing
As the number of computing devices embedded into engineered systems continues to rise, there is a widening gap between the needs of the user to control aggregates of devices and t...
Jacob Beal, Stefan Dulman, Kyle Usbeck, Mirko Viro...
WPES
2006
ACM
15 years 3 months ago
Nonesuch: a mix network with sender unobservability
Oblivious submission to anonymity systems is a process by which a message may be submitted in such a way that neither the anonymity network nor a global passive adversary may dete...
Thomas S. Heydt-Benjamin, Andrei Serjantov, Beness...