Sciweavers

43 search results - page 1 / 9
» A survey of DHT security techniques
Sort
View
CSUR
2011
12 years 12 months ago
A survey of DHT security techniques
Guido Urdaneta, Guillaume Pierre, Maarten van Stee...
ICDCSW
2007
IEEE
13 years 11 months ago
Survey of Six Myths and Oversights about Distributed Hash Tables' Security
Distributed Hash Tables (DHT) was not designed to be secure against malicious users. But some secure systems like trust and reputation management algorithms trust DHT with their d...
Sylvain Dahan, Mitsuhisa Sato
ANSS
2008
IEEE
13 years 11 months ago
SCAR - Scattering, Concealing and Recovering Data within a DHT
This paper describes a secure and reliable method for storing data in a distributed hash table (DHT) leveraging the inherent properties of the DHT to provide a secure storage subs...
Bryan N. Mills, Taieb Znati
DATE
2005
IEEE
125views Hardware» more  DATE 2005»
13 years 10 months ago
Hardware Engines for Bus Encryption: A Survey of Existing Techniques
The widening spectrum of applications and services provided by portable and embedded devices bring a new dimension of concerns in security. Most of those embedded systems (pay-TV,...
Reouven Elbaz, Lionel Torres, Gilles Sassatelli, P...
COMSUR
2008
110views more  COMSUR 2008»
13 years 4 months ago
Service discovery for mobile ad hoc networks: A survey of issues and techniques
This paper surveys research in service advertising, discovery and selection for mobile ad hoc networks (MANETs) and related issues. We include a categorization of service discovery...
Christopher N. Ververidis, George C. Polyzos