Sciweavers

6 search results - page 1 / 2
» Protocol Independence through Disjoint Encryption
Sort
View
CSFW
2000
IEEE
13 years 9 months ago
Protocol Independence through Disjoint Encryption
One protocol (called the primary protocol) is independent of other protocols (jointly called the secondary protocol) if the question whether the primary protocol achieves a securi...
Joshua D. Guttman, F. Javier Thayer
FC
2005
Springer
142views Cryptology» more  FC 2005»
13 years 10 months ago
Testing Disjointness of Private Datasets
Two parties, say Alice and Bob, possess two sets of elements that belong to a universe of possible values and wish to test whether these sets are disjoint or not. In this paper we ...
Aggelos Kiayias, Antonina Mitrofanova
JNW
2008
115views more  JNW 2008»
13 years 4 months ago
On the Interaction Between Multiple Paths and Wireless Mesh Networks Scheduler Approaches
Multi-path routing allows building and use of multiple paths for routing between a source-destination pair. This paper investigates the problem of selecting multiple routing paths ...
Valeria Loscrì
ACISICIS
2009
IEEE
13 years 11 months ago
BackupIT: An Intrusion-Tolerant Cooperative Backup System
Reliable storage of large amounts of data is always a delicate issue. Availability, efficiency, data integrity, and confidentiality are some features a data backup system should...
Sérgio Raymundo Loest, Marcelo Cheminn Madr...
EDCC
2010
Springer
13 years 9 months ago
D2HT: The Best of Both Worlds, Integrating RPS and DHT
Distributed Hash Tables (DHTs) and Random Peer Sampling (RPS) provide important and complementary services in the area of P2P overlay networks. DHTs achieve efficient lookup whil...
Marin Bertier, François Bonnet, Anne-Marie ...