2015 IEEE 40th Conference on Local Computer Networks (LCN) 2015
DOI: 10.1109/lcn.2015.7366330
|View full text |Cite
|
Sign up to set email alerts
|

FRoDO: Friendly routing over dunbar-based overlays

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
2
2
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…Several theories have been taken into consideration for the systematic development of overlays with desired properties such as locality awareness, anonymity, mobility and other features [77]. Examples include Geodemlia [78] and LobSter [79] which are location-aware overlays, FRoDO [80] which supports anonymous communications.…”
Section: Other Overlay Considerationsmentioning
confidence: 99%
“…Several theories have been taken into consideration for the systematic development of overlays with desired properties such as locality awareness, anonymity, mobility and other features [77]. Examples include Geodemlia [78] and LobSter [79] which are location-aware overlays, FRoDO [80] which supports anonymous communications.…”
Section: Other Overlay Considerationsmentioning
confidence: 99%
“…4) Other overlay considerations: Several theories have been taken into consideration for the systematic development of overlays with desired properties such as locality awareness, anonymity, mobility and other features [103]. Examples include Geodemlia [104] and LobSter [105] which are location-aware overlays, FRoDO [106] which supports anonymous communications.…”
Section: A Overlay Structuresmentioning
confidence: 99%
“…Input: the user identity U id , the message wanted to post msg, the policy used to encrypt message P, the user's UMC address U MC addr , the user's UMC U MC, the user's token token Output: the key of AES encryption aes K ey, the key encrypted by CP-ABE aes K ey Enc, the message encrypted by AES msg Enc, the hash of encrypted message hash 1: if U id is unregistered then aes K ey, aes K ey Enc = get Aes K ey(P) 10: msg Enc = AE S Encr ypt (msg, aes K ey) 11: hash = md5(msg Enc) 12: uploadT oStor age(hash, token, (msg Enc, aes K ey Enc)) 13: U MC.Posts.new(hash, cur T i me) 14: Post I n f orm(hash, cur T i me) 15: final value and a tuple composed of the AES key and the encrypted message are uploaded to the storage layer as key-value pairs. Finally, the user's UMC puts the hash value and the current timestamp to the post list.…”
Section: Algorithm 5 Postmentioning
confidence: 99%