Sciweavers

164 search results - page 23 / 33
» Bootstrapping of Peer-to-Peer Networks
Sort
View
EUROCRYPT
2012
Springer
12 years 12 months ago
Fully Homomorphic Encryption with Polylog Overhead
We show that homomorphic evaluation of (wide enough) arithmetic circuits can be accomplished with only polylogarithmic overhead. Namely, we present a construction of fully homomorp...
Craig Gentry, Shai Halevi, Nigel P. Smart
GLOBECOM
2008
IEEE
15 years 3 months ago
Robustness Analysis of Source Localization Using Gaussianity Measure
Nowadays, the source localization has been widely applied for wireless sensor networks. The Gaussian mixture model has been adopted for maximum-likelihood (ML) source localization ...
Kun Yan, Hsiao-Chun Wu, S. S. Iyengar
PRDC
2008
IEEE
15 years 3 months ago
On the Complexity of a Self-Stabilizing Spanning Tree Algorithm for Large Scale Systems
Many large scale systems, like grids and structured peer to peer systems, operate on a constrained topology. Since underlying networks do not expose the real topology to the appli...
Julien Clement, Thomas Hérault, Stép...
SSS
2007
Springer
15 years 3 months ago
Decentralized, Connectivity-Preserving, and Cost-Effective Structured Overlay Maintenance
In this paper we present a rigorous treatment to structured overlay maintenance in decentralized peerto-peer (P2P) systems subject to various system and network failures. we prese...
Yu Chen, Wei Chen
COMCOM
2011
14 years 4 months ago
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
Key distribution in Wireless Sensor Networks (WSNs) is challenging. Symmetric cryptosystems can perform it efficiently, but they often do not provide a perfect trade-off between ...
Leonardo B. Oliveira, Diego F. Aranha, Conrado Por...