Secrecy Analysis of Overlay Mechanism in Radio Frequency Energy Harvesting Networks with Jamming under Nakagami-m fading

H Dang-Ngoc, K Ho-Van, T Do-Dac - Wireless Personal Communications, 2021 - Springer
… This section illustrates the secrecy capability of the overlay mechanism in RF energy
harvesting networks with jamming over the Nakagami-m fading channels in numerous key system …

SOS: Secure overlay services

AD Keromytis, V Misra, D Rubenstein - ACM SIGCOMM Computer …, 2002 - dl.acm.org
overlay, the traffic is tunneled securely for several hops along the overlay to the “approved”
(and secret … Our analysis assumes that when an attack on a node is terminated, that node is …

Mitigation of peer‐to‐peer overlay attacks in the automatic metering infrastructure of smart grids

C Rottondi, M Savi, G Verticale… - Security and …, 2015 - Wiley Online Library
overlay. We also propose some countermeasures to mitigate the effects of such attacks: we
integrate a verifiable secret … Because a detailed security analysis of the SSS scheme has …

Understanding when location-hiding using overlay networks is feasible

J Wang, AA Chien - Computer Networks, 2006 - Elsevier
… how attacks, defense mechanisms, and correlated host … analysis and Monte Carlo
simulation techniques to analyze … network, and the IP address of the application is kept secret. …

Investigations on Secrecy Performance of Downlink Overlay CR-NOMA System With SIC Imperfections

KK Godugu, S Vappangi - IEEE Access, 2024 - ieeexplore.ieee.org
secrecy performance. In addition, for characterizing the secrecy performance of the proposed
overlay … Further, the authors in this work focus on the analysis of SOP, which varies based …

Anonymous communication in overlay networks

J Ren, Y Li, T Jiang, T Li - Security and Communication …, 2016 - Wiley Online Library
analysis, in this paper, the nodes in each subgroup are logically organized into an overlay
… introduce the concept of anonymous authentication or secret handshake by Balfanz et al. 32…

Anonymity and censorship resistance in unstructured overlay networks

M Backes, M Hamerlik, A Linari, M Maffei… - … Conferences" On the …, 2009 - Springer
… The secrecy of the resource is protected by cryptography, … previously shared secrets or
centralised infrastructures. … As future work, we plan to extend our analysis to other sophisticated …

Security analysis of a single sign-on mechanism for distributed computer networks

G Wang, J Yu, Q Xie - IEEE Transactions on Industrial …, 2012 - ieeexplore.ieee.org
Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a
single credential to be authenticated by multiple service providers in a distributed computer …

Offering data confidentiality for multimedia overlay multicast: Design and analysis

WPK Yiu, SHG Chan - ACM Transactions on Multimedia Computing …, 2008 - dl.acm.org
… We term this system Secure OverlayOverlay Multicast (SOM) to provide data confidentiality
for application layer multicast. Our scheme guarantees both forward and backward secrecy

Overlay networks: An akamai perspective

RK Sitaraman, M Kasbekar… - … Streaming, and Cloud …, 2014 - Wiley Online Library
overlays are an important type of overlay, we do not describe them in more detail here. All the
three types of overlays … -to-overlay communication using a shared secret can further thwart …