Key-based routing

Results: 22



#Item
11Distributed data storage / Cryptographic hash function / Wireless sensor network / Denial-of-service attack / Man-in-the-middle attack / Onion routing / Cryptography / Public-key cryptography / Message authentication code

Pre-Authentication Filters: Providing DoS Resistance for Signature-Based Broadcast Authentication in Sensor Networks Qi Dong Donggang Liu∗ Peng Ning†

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:21
12Network architecture / Kademlia / Distributed hash table / Pastry / Routing / OverSim / Key-based routing / Overlay network / Kad network / Distributed data storage / Computing / Computer architecture

R/Kademlia: Recursive and Topology-Aware Overlay Routing

Add to Reading List

Source URL: telematics.tm.kit.edu

Language: English - Date: 2011-04-06 06:51:46
13Computer architecture / Kademlia / Routing / Key-based routing / Overlay network / Peer-to-peer / Distributed data storage / Computing / Network architecture

R/Kademlia: Recursive and Topology-aware Overlay Routing Bernhard Heep ATNAC 2010, Auckland, New Zealand, Institute of Telematics, Department of Computer Sciences

Add to Reading List

Source URL: telematics.tm.kit.edu

Language: English - Date: 2011-04-06 06:51:49
14Wireless ad-hoc network / Mobile ad hoc network / Key distribution / ID-based encryption / Public-key cryptography / Wireless sensor network / Support / Routing / Wireless mesh network / Wireless networking / Technology / Telecommunications engineering

Evaluation of Key Management in ad hoc Networks for Emergency and Rescue Operations (Extended Abstract) A. M. Hegland * E. Winjum* Ø. Kure† S.F.Mjølsnes† C. Rong§ P. Spilling* *UniK – University Graduate Center

Add to Reading List

Source URL: www.nik.no

Language: English - Date: 2005-12-08 10:12:47
15Computing / Software engineering / Distributed data storage / Public-key cryptography / Computer programming / Message-oriented middleware / Distributed computing architecture / Publish–subscribe pattern

Securing Publish-Subscribe Overlay Services with EventGuard Abstract. is the decoupling of publishers and subscribers combined with content-based routing protocols, enabling a manyto-many communication model. Such a mode

Add to Reading List

Source URL: www.cc.gatech.edu

Language: English - Date: 2007-04-03 01:14:46
16Securities / Interbank networks / Public-key cryptography / Payment systems / Clearing / Federal Reserve System / Routing transit number / Server / Client–server model / Financial economics / Finance / Financial system

Federal Reserve Bank External Server-BAsed Certificate Request Form for FedLine Direct File

Add to Reading List

Source URL: www.frbservices.org

Language: English - Date: 2013-07-03 10:26:56
17Securities / Interbank networks / Public-key cryptography / Payment systems / Clearing / Federal Reserve System / Routing transit number / Server / Client–server model / Financial economics / Finance / Financial system

Federal Reserve Bank External Server-BAsed Certificate Request Form for FedLine Direct File

Add to Reading List

Source URL: frbservices.org

Language: English - Date: 2013-07-03 10:26:56
18Securities / Interbank networks / Public-key cryptography / Payment systems / Clearing / Federal Reserve System / Routing transit number / Server / Client–server model / Financial economics / Finance / Financial system

Federal Reserve Bank External Server-BAsed Certificate Request Form for FedLine Direct File

Add to Reading List

Source URL: www.frbservices.org

Language: English - Date: 2013-07-03 10:26:56
19Internet standards / Network mapping / Traceroute / Network topology / IPv6 / Entailment / Topology / Routing / IPv4 / Logic / Network architecture / Internet

A logic distance-based method for deploying probing sources in the topology discovery Xin Zou, Zhongliang Qiao, Gang Zhou∗ , Ke Xu State Key Lab. of Software Development Environment, Beihang University, Beijing[removed],

Add to Reading List

Source URL: ipv6.nlsde.buaa.edu.cn

Language: English - Date: 2009-08-01 08:04:09
20Computing / Routing / Mobile ad hoc network / Wireless security / Wireless ad-hoc network / Peer-to-peer / Public-key cryptography / Scalable Source Routing / Wireless Routing Protocol / Wireless networking / Technology / Telecommunications engineering

Key Distribution in Mobile Ad Hoc Networks based on Message Relaying? Johann van der Merwe, Dawoud Dawoud, and Stephen McDonald University of KwaZulu-Natal, School of Electrical, Electronic and Computer Engineering, Sout

Add to Reading List

Source URL: johannvandermerwe.co.za

Language: English - Date: 2013-06-28 06:18:16
UPDATE