Sciweavers

374 search results - page 56 / 75
» Towards Secure and Scalable Computation in Peer-to-Peer Netw...
Sort
View
ICNP
2003
IEEE
15 years 5 months ago
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized autho...
Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi
PERCOM
2007
ACM
15 years 11 months ago
SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks
Mobile ad hoc networks show great potential in emergency response and/or recovery. Such mission-critical applications demand security service be "anywhere", "anytim...
Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou ...
ICNP
2000
IEEE
15 years 4 months ago
Building a Programmable Multiplexing Service Using Concast
Concast is a scalable “inverse-multicast” network service: messages sent from multiple sources toward the same destination are merged into a single message that is delivered t...
Kenneth L. Calvert, Jim Griffioen, Amit Sehgal, Su...
TON
2008
108views more  TON 2008»
14 years 11 months ago
Impact of denial of service attacks on ad hoc networks
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc netw...
Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly
SOUPS
2010
ACM
15 years 3 months ago
Usably secure, low-cost authentication for mobile banking
This paper explores user authentication schemes for banking systems implemented over mobile phone networks in the developing world. We analyze an authentication scheme currently d...
Saurabh Panjwani, Edward Cutrell