Sciweavers

30 search results - page 2 / 6
» Authentication with controlled anonymity in P2P systems
Sort
View
ICNP
2003
IEEE
13 years 10 months ago
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized autho...
Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi
DBSEC
2010
162views Database» more  DBSEC 2010»
13 years 6 months ago
Distributed and Secure Access Control in P2P Databases
The intent of peer data management systems (PDMS) is to share as much data as possible. However, in many applications leveraging sensitive data, users demand adequate mechanisms to...
Angela Bonifati, Ruilin Liu, Hui (Wendy) Wang
ICMCS
2007
IEEE
170views Multimedia» more  ICMCS 2007»
13 years 11 months ago
A DRM Architecture for Manageable P2P Based IPTV System
With the improvement of network bandwidth, multimedia services based on streaming live media have gained much attention recently, among which IPTV has become a hot topic. After em...
Xiaoyun Liu, Tiejun Huang, Longshe Huo, Luntian Mo...
SASO
2007
IEEE
13 years 11 months ago
An Amortized Tit-For-Tat Protocol for Exchanging Bandwidth instead of Content in P2P Networks
Incentives for resource sharing are crucial for the proper operation of P2P networks. The principle of the incentive mechanisms in current content sharing P2P networks such as Bit...
Pawel Garbacki, Dick H. J. Epema, Maarten van Stee...
SASN
2003
ACM
13 years 10 months ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi