Sciweavers

1498 search results - page 137 / 300
» Collection tree protocol
Sort
View
FC
2010
Springer
230views Cryptology» more  FC 2010»
15 years 6 months ago
Multiple Denominations in E-cash with Compact Transaction Data
We present a new construction of divisible e-cash that makes use of 1) a new generation method of the binary tree of keys; 2) a new way of using bounded accumulators. The transacti...
Sébastien Canard, Aline Gouget
106
Voted
AINA
2004
IEEE
15 years 6 months ago
A Time and Distance - Based Multicast Algorithm for IPv6 Mobile Networks
IP multicasting has naturally been considered the ideal technique to be used with multimedia communications. Unfortunately, current multicast protocols do not consider the dynamic...
Wu-Hsiao Hsu, Bin-Hau Lee, Ming-Han Liu, Bor-Yeh S...
94
Voted
DKE
2008
98views more  DKE 2008»
15 years 2 months ago
Privacy-preserving imputation of missing data
Handling missing data is a critical step to ensuring good results in data mining. Like most data mining algorithms, existing privacy-preserving data mining algorithms assume data ...
Geetha Jagannathan, Rebecca N. Wright
126
Voted
JPDC
2006
105views more  JPDC 2006»
15 years 2 months ago
Mutual anonymous overlay multicast
Multicast services are demanded by a variety of applications. Many applications require anonymity during their communication. However, there has been very little work on anonymous...
Li Xiao, Yunhao Liu, Wenjun Gu, Dong Xuan, Xiaomei...
106
Voted
ICUMT
2009
15 years 10 days ago
Towards real implementations of dynamic robust routing exploiting path diversity
In this paper we compare the performance of tree different dynamic traffic engineering algorithms exploiting path diversity in the Internet, TEXCP, TRUMP and MIRTO. We passed throu...
Luca Muscariello, Diego Perino, Bruno Nardelli