Sciweavers

448 search results - page 42 / 90
» k-anonymous message transmission
Sort
View
JNW
2007
86views more  JNW 2007»
14 years 10 months ago
Reliable Actuation in Sensor Networks
Abstract—We present a protocol that uses a publish/subscribe approach to perform reliable but efficient actuation over a sensor network whose topology may change. Actuation on a...
Sean Rooney, Luis Garcés-Erice
APNOMS
2009
Springer
15 years 4 months ago
Group P2P Network Organization in Mobile Ad-Hoc Network
This paper proposes an effective file searching scheme named Group P2P to reduce the number of message transmission. In the Group P2P, peers distinguish Parent Peer from Child Peer...
Rim Haw, Choong Seon Hong, Dae Sun Kim
COCOON
2005
Springer
15 years 3 months ago
Radio Networks with Reliable Communication
Abstract. Problems of secure communication and computation have been studied extensively in network models, for example, Franklin and Yung have studied secure communications in the...
Yvo Desmedt, Yongge Wang, Reihaneh Safavi-Naini, H...
ADHOC
2007
107views more  ADHOC 2007»
14 years 10 months ago
On-line disjoint path routing for network capacity maximization in energy-constrained ad hoc networks
In this paper we consider on-line disjoint path routing in energy-constrained ad hoc networks. The objective is to maximize the network capacity, i.e. maximize the number of messa...
Weifa Liang, Yuzhen Liu
EUROCRYPT
2008
Springer
14 years 11 months ago
Almost-Everywhere Secure Computation
Secure multi-party computation (MPC) is a central problem in cryptography. Unfortunately, it is well known that MPC is possible if and only if the underlying communication network...
Juan A. Garay, Rafail Ostrovsky