Sciweavers

89 search results - page 5 / 18
» Decentralized user authentication in a global file system
Sort
View
NDSS
2003
IEEE
15 years 4 months ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the serverâ...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
CSREASAM
2006
15 years 1 months ago
A Study on DRM System for On/Off Line Key Authentication
- This paper proposes a Hash Chain algorithm to create a key safer than the existing encryption method, and suggests an encryption method of higher security than the existing syste...
Kun-Won Jang, Chan-Kil Park, Jung-Jae Kim, Moon-Se...
CORR
2006
Springer
107views Education» more  CORR 2006»
14 years 11 months ago
Optimal Scheduling of Peer-to-Peer File Dissemination
Peer-to-peer (P2P) overlay networks such as BitTorrent and Avalanche are increasingly used for disseminating potentially large files from a server to many end users via the Intern...
Jochen Mundinger, Richard R. Weber, Gideon Weiss
FTDCS
2003
IEEE
15 years 4 months ago
Autonomous Decentralized Community Concept and Architecture for a Complex Adaptive Information System
The global information service in the Internet is a heterogeneous and rapidly evolving environment. Constantly, new information services are added, others are modified, removed or...
Khaled Ragab, Takanori Ono, Naohiro Kaji, Kinji Mo...
EUROCRYPT
2011
Springer
14 years 3 months ago
Decentralizing Attribute-Based Encryption
We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our system, any party can become an authority and there is no requirement for any global coordination othe...
Allison B. Lewko, Brent Waters