• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,626
Next 10 →

Resilient Consensus Protocol in the Presence of Trusted Nodes

by Waseem Abbas, Yevgeniy Vorobeychik, Xenofon Koutsoukos
"... Abstract—In this paper, we propose a scheme for a resilient distributed consensus problem through a set of trusted nodes within the network. Currently, algorithms that solve resilient consensus problem de-mand networks to have high connectivity to overrule the effects of adversaries, or require node ..."
Abstract - Add to MetaCart
Abstract—In this paper, we propose a scheme for a resilient distributed consensus problem through a set of trusted nodes within the network. Currently, algorithms that solve resilient consensus problem de-mand networks to have high connectivity to overrule the effects of adversaries, or require

Friendstore: cooperative online backup using trusted nodes

by Dinh Nguyen Tran, Frank Chiang, Jinyang Li
"... Today, it is common for users to own more than tens of gigabytes of digital pictures, videos, experimental traces, etc. Although many users already back up such data on a cheap second disk, it is desirable to also seek off-site redundancies ..."
Abstract - Cited by 49 (2 self) - Add to MetaCart
Today, it is common for users to own more than tens of gigabytes of digital pictures, videos, experimental traces, etc. Although many users already back up such data on a cheap second disk, it is desirable to also seek off-site redundancies

TRUST NODES ROUTING TECHNIQUE FOR MANET IN ADVERSARIAL ENVIRONMENTS

by Mr. P. Dhakshina Moorthi, Dr. M. Balachandran
"... Abstract — The mobile ad hoc networks (MANETs) is wireless and dynamic topology network medium, which may suffer from many open security criticism. The major issue of mobile ad hoc networks (MANETs) is to send the data in secure manner from source to destination node in adversarial (opponent) enviro ..."
Abstract - Add to MetaCart
works on the basis of authentication group signature, and onion routing protocol. In this paper proposal routing protocol method is Authenticated Anonymous Secure Routing with Trust based model. AASR protocol concept is to defend the neighbor nodes attack by the way of key-encryption and decryption

A Tunable Mechanism for Identifying Trusted Nodes in Large Scale Distributed Networks

by Joydeep Ch, Ingo Scholtes, Niloy Ganguly, Frank Schweitzer
"... Abstract—In this paper, we propose a simple randomized protocol for identifying trusted nodes based on personalized trust in large scale distributed networks. The problem of identifying trusted nodes, based on personalized trust, in a large network setting stems from the huge computation and message ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract—In this paper, we propose a simple randomized protocol for identifying trusted nodes based on personalized trust in large scale distributed networks. The problem of identifying trusted nodes, based on personalized trust, in a large network setting stems from the huge computation

Ariadne: a secure on-demand routing protocol for ad hoc networks," in

by Yih-Chun Hu , Adrian Perrig , David B Johnson - Proc. 8th ACM International Conf. Mobile Computing Networking , , 2002
"... Abstract An ad hoc network is a group of wireless mobile computers (or nodes), in which individual nodes cooperate by forwarding packets for each other to allow nodes to communicate beyond direct wireless transmission range. Prior research in ad hoc networking has generally studied the routing prob ..."
Abstract - Cited by 925 (12 self) - Add to MetaCart
Abstract An ad hoc network is a group of wireless mobile computers (or nodes), in which individual nodes cooperate by forwarding packets for each other to allow nodes to communicate beyond direct wireless transmission range. Prior research in ad hoc networking has generally studied the routing

SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks

by Yih-Chun Hu, David B. Johnson, Adrian Perrig , 2003
"... An ad hoc network is a collection of wireless computers (nodes), communicating among themselves over possibly multihop paths, without the help of any infrastructure such as base stations or access points. Although many previous ad hoc network routing protocols have been based in part on distance vec ..."
Abstract - Cited by 534 (8 self) - Add to MetaCart
An ad hoc network is a collection of wireless computers (nodes), communicating among themselves over possibly multihop paths, without the help of any infrastructure such as base stations or access points. Although many previous ad hoc network routing protocols have been based in part on distance

Secure routing for structured peer-to-peer overlay networks

by Miguel Castro, Peter Druschel, Ayalvadi Ganesh, Antony Rowstron, Dan S. Wallach , 2002
"... Structured peer-to-peer overlay networks provide a sub-strate for the construction of large-scale, decentralized applications, including distributed storage, group com-munication, and content distribution. These overlays are highly resilient; they can route messages correctly even when a large fract ..."
Abstract - Cited by 473 (12 self) - Add to MetaCart
without pre-existing trust relationships wish to pool their resources. This paper studies attacks aimed at preventing correct message delivery in structured peer-to-peer overlays and presents defenses to these attacks. We describe and eval-uate techniques that allow nodes to join the overlay, to maintain

How Can Quasi-trusted Nodes Help to Securely Relay QKD Keys?

by Quoc-cuong Le, Patrick Bellot , 2008
"... We propose a new definition for quasi-trusted relays. Our quasi-trusted relays are defined as follows: (1) being honest enough to correctly follow a given multi-party finitetime communication protocol; (2) however, being under the monitoring of eavesdroppers. From the new definition, we first develo ..."
Abstract - Add to MetaCart
We propose a new definition for quasi-trusted relays. Our quasi-trusted relays are defined as follows: (1) being honest enough to correctly follow a given multi-party finitetime communication protocol; (2) however, being under the monitoring of eavesdroppers. From the new definition, we first

A Ticket Based Binding Update Authentication Method for Trusted Nodes in Mobile IPv6 Domain

by Ilsun You
"... Abstract. With the increasing usage of Mobile IPv6 in the mobile internet environment, the need of binding update authentication methods to protect malicious biding updates becomes more prevalent. The current authentication methods have tried to secure the biding update process between two previous ..."
Abstract - Add to MetaCart
previously unknown nodes on the assumption that no global security infrastructure available. However, the assumption is improper for a network domain where involved nodes can establish trust with each other. In this paper, for such a network domain, we propose a ticket based BU authentication method. Our

PAST: A large-scale, persistent peer-to-peer storage utility

by Peter Druschel, Antony Rowstron - In HotOS VIII , 2001
"... This paper sketches the design of PAST, a large-scale, Internet-based, global storage utility that provides scalability, high availability, persistence and security. PAST is a peer-to-peer Internet application and is entirely selforganizing. PAST nodes serve as access points for clients, participate ..."
Abstract - Cited by 343 (5 self) - Add to MetaCart
, participate in the routing of client requests, and contribute storage to the system. Nodes are not trusted, they may join the system at any time and may silently leave the system without warning. Yet, the system is able to provide strong assurances, efficient storage access, load balancing and scalability.
Next 10 →
Results 1 - 10 of 1,626
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University