7 results where year includes 2005.
On the Cost-Ineffectiveness of Redundancy in Commercial P2P Computing.
, , and . In Proc. ACM Conference on Computer and Communications Security (CCS), pages 280--288, November 2005.
Keywords: security; peer-to-peer; Sybil attack; Synthesis project; [bibtex] [PDF] [link]
Creating Social Networks to Improve Peer-to-Peer Networking.
, , and . In Proc. ACM Intl. Conf. on Knowledge Discovery in Data Mining (KDD), pages 568--573, August 2005.
Keywords: peer-to-peer; [bibtex] [PDF] [link]
Supporting P2P Gaming When Players Have Heterogeneous Resources.
and . In Proc. ACM Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV), pages 1--6, June 2005.
Keywords: peer-to-peer; gaming; [bibtex] [PDF] [link]
Privacy Vulnerabilities in Encrypted HTTP Streams.
, , , and . In Proc. Privacy Enhancing Technologies Workshop (PET), pages 1--11, May 2005.
Keywords: security; anonymity; privacy; [bibtex] [PDF] [traces] [link]
Distributed Information Retrieval For Disruption-Tolerant Mobile Networks.
, , and . CIIR Technical Report IR-412, University of Massachusetts Amherst, March 2005.
Keywords: DTN; information retrieval; DOME; [bibtex] [pdf] [link]
Authenticated Routing for Ad hoc Networks.
, , , , , and . IEEE/ACM Journal of Selected Areas in Communications: Special issue on Wireless Ad hoc Networks (JSAC), 23(3):598--610, March 2005.
Keywords: wireless; security; routing; Journal Paper; [bibtex] [PDF] [link]
MV Routing and Capacity Building in Disruption Tolerant Networks.
, , and . In Proc. IEEE INFOCOM, pages 398--408, March 2005.
Keywords: routing; DTN; wireless; Synthesis project; DOME; [bibtex] [PDF] [link]