Sciweavers

7 search results - page 2 / 2
» Random mappings with exchangeable in-degrees
Sort
View
ICISC
2004
147views Cryptology» more  ICISC 2004»
13 years 7 months ago
Batch Verifications with ID-Based Signatures
An identity (ID)-based signature scheme allows any pair of users to verify each other's signatures without exchanging public key certificates. With the advent of Bilinear maps...
HyoJin Yoon, Jung Hee Cheon, Yongdae Kim
INFOCOM
2010
IEEE
13 years 3 months ago
Measurement and Diagnosis of Address Misconfigured P2P Traffic
Misconfigured P2P traffic caused by bugs in volunteer-developed P2P software or by attackers is prevalent. It influences both end users and ISPs. In this paper, we discover and stu...
Zhichun Li, Anup Goyal, Yan Chen, Aleksandar Kuzma...