Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
DHT
biblio
A Hierarchical P2P Overlay for Hierarchical Mobile Ad hoc Networks (MANETs)
Submitted by aekwall on Mon, 04/06/2020 - 9:15am
specific routing roles
flat logical overlay
hierarchical MANETs
hierarchical mobile ad hoc networks
Hierarchical Networks
hierarchical underlay
mobility scenarios
OMNET++
specific performance challenges
dynamic topology changes
Structured Overlay
tactical networks
topology-awareness
underlay mismatch
underlay topology
wireless networks
peer to peer security
telecommunication network topology
Resiliency
pubcrawl
p2p
Peer-to-peer computing
Metrics
telecommunication network routing
MANET
mobile ad hoc networks
telecommunication security
Scalability
Human Factors
mobile devices
DHT
dedicated servers
deployment
deployment solution
biblio
Secure and Scalable Trust Management Model for IoT P2P Network
Submitted by aekwall on Mon, 04/06/2020 - 9:14am
security issues
peer to peer security
P2P network
large-scale trust model
IoT trust management
IoT resources
IoT P2P network
IoT entities
Holochain
fog node approach
distributed trust management model
DHT
centralized models
blockchain-based trust management model
Trust management
security of data
Human Factors
Scalability
IoT security
Reliability
blockchain
Metrics
Peer-to-peer computing
component
pubcrawl
Resiliency
Data models
Trusted Computing
data integrity
Internet of Things
biblio
Access Control for Secure Distributed Data Structures in Distributed Hash Tables
Submitted by grigby1 on Mon, 03/19/2018 - 12:35pm
Resiliency
middleware
middle-ware scheme
P2P networks
P2P overlays
Peer-to-peer computing
peer-to-peer networks
pubcrawl
resilience
Metrics
reusable security architecture
secure distributed data structures
Secure File Sharing
security issues
social networking (online)
social networks
social projects
trusted third parties
data structures
authorisation
centralized servers
client-server model
client-server systems
communication protocols
composability
computer network security
Context
Access Control
DDS
DHT
Distributed databases
distributed data storage services
distributed hash tables
encryption
file sharing
Human behavior
biblio
Ubiquitous Interpersonal Communication over Ad-hoc Networks and the Internet
Submitted by BrandonB on Wed, 05/06/2015 - 7:56am
Public key
IP networks
low-level software
mobile ad hoc networks
mobile computing
mobile devices
mobile-to-mobile communication
Networking Protocol
packet radio networks
Priority Mechanism
Interpersonal Communication
Receivers
rendezvous points
RP
social network
Social network services
telecommunication network routing
ubiquitous interpersonal communication
Wireless communication
wireless LAN
delay tolerant networks
ad-hoc 802.11 networks
Ad-Hoc Network
authentication
Bluetooth
cognitive radio
Cryptography
decentralized model
decentralized network routing
delay tolerant networking
Ad hoc networks
Delay-Tolerant Network
DHT
distributed hash tables
DTN
encryption
flexible trust network
hop-limited broadcast
Infrastructureless Communication
internet
file
A Multi-Resolution Virtual Synchrophasor Data Communication Framework
Submitted by yxin on Mon, 02/17/2014 - 3:43pm. Contributors:
Yufeng Xin
Aranya Chakrabortty
Frank Mueller
CPS Domains
Architectures
Architectures
Communication
Control
Energy
CPS Technologies
Foundations
DHT
network coding
overlay
Virtual PMU
The University of North Carolina at Chapel Hill
North Carolina State University
CFP Paper Submissions
CFP Submissions
2013 National Workshop on Energy Cyber-Physical Systems
2013
Academia
Position Paper
Publications
file
Persea : A Sybil-Resistant Social DHT
Submitted by Katie Dey on Thu, 11/01/2012 - 2:52pm. Contributors:
Matthew Wright
Mahdi Nasrullah Al-Ameen
ABSTRACT
SaTC Posters
DHT
p2p
Sybil attack
University of Texas at Arlington
SaTC PI Meeting 2012
Academia
Poster