This paper presents Group Membership Service for JXTA extended with single or bi-directional authentication. The proposed solution exploits certificates and PKI (Public Key Infrast...
Lukasz Kawulok, Krzysztof Zielinski, Michal Jaesch...
Abstract Benny Pinkas HP Labs Abstract. We demonstrate a transformation of Yao’s protocol for secure two-party computation to a fair protocol in which neither party gains any sub...
Due to their nature, Peer-to-Peer (P2P) systems are subject to a wide range of security issues. In this paper, we focus on a specific security property, called the root authenticit...
In recent years, wireless Internet service providers (WISPs) have established Wi-Fi hotspots in increasing numbers at public venues, providing local coverage to traveling users an...
Anand Balachandran, Geoffrey M. Voelker, Paramvir ...
Programmable graphics processing units (GPUs) have emerged as excellent computational platforms for certain general-purpose applications. The data parallel execution capabilities ...