Results 51 to 60 of about 496,765 (185)
Playing With Population Protocols
Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some ...
Anthony K. Seda +7 more
core +3 more sources
Fault-Tolerant Consensus in Unknown and Anonymous Networks [PDF]
This paper investigates under which conditions information can be reliably shared and consensus can be solved in unknown and anonymous message-passing networks that suffer from crash-failures.
Delporte-Gallet, Carole +2 more
core +3 more sources
Content-centric networking using anonymous datagrams [PDF]
Using Interests (requests that elicit content) and maintaining per-Interest forwarding state in Pending Interest Tables (PIT) are integral to the design of the Named Data Networking (NDN) and Content-Centric Networking (CCNx) architectures. However, using PITs makes the network vulnerable to Interest-flooding attacks, and PITs can become very large. It
Garcia-Luna-Aceves, J. J. +1 more
openaire +2 more sources
Anonymous aggregator election protocol for wireless sensor networks
An anonymous cluster head election protocol in clustered wireless sensor networks was proposed.The protocol detailed the decision rules and mode of cluster construction while an anonymous veto protocol based on bilinear pairings was adopted to verify ...
Shuai FU +3 more
doaj +2 more sources
The advancement of Wireless Body Area Networks (WBAN) have led to significant progress in medical and health care systems. However, such networks still suffer from major security and privacy threats, especially for the data collected in medical or health
Chien-Ming Chen +3 more
doaj +1 more source
Black Hole Search with Finite Automata Scattered in a Synchronous Torus
We consider the problem of locating a black hole in synchronous anonymous networks using finite state agents. A black hole is a harmful node in the network that destroys any agent visiting that node without leaving any trace.
Chalopin, Jérémie +3 more
core +5 more sources
An Architecture for Accountable Anonymous Access in the Internet-of-Things Network
With the rapid development of the Internet, more and more devices are being connected to the Internet, making up the Internet-of-Things (IoT). The accountability and privacy are two important but contradictory factors to ensure the security of IoT ...
Yuxiang Ma, Yulei Wu, Jingguo Ge, Jun Li
doaj +1 more source
AAAS: An Anonymous Authentication Scheme Based on Group Signature in VANETs
As special ad-hoc networks, vehicular ad-hoc networks (VANETs) support vehicles to communicate with each other via opportunistic wireless links. In order to protect privacy of drivers, vehicles registered in VANETs are required to authenticate and ...
Yanji Jiang, Shaocheng Ge, Xueli Shen
doaj +1 more source
Mental Health–Related Behaviors and Discussions Among Young Adults: Analysis and Classification
BackgroundThere have been recurring reports of web-based harassment and abuse among adolescents and young adults through anonymous social networks. ObjectiveThis study aimed to explore discussions on the popular anonymous social network Yik ...
Rivas, Ryan +4 more
doaj +1 more source
Trusted and anonymous authentication scheme for wireless networks
A trusted and anonymous wireless authentication protocol was proposed by using of temporary identities and one time secret keys, both user identity and platform were authenticated under the proposed protocol.It has demonstrated that the proposed scheme ...
YANG Li1 +2 more
doaj +2 more sources

