Sciweavers

517 search results - page 14 / 104
» Distributed Authentication in GRID5000
Sort
View
ESORICS
2002
Springer
15 years 9 months ago
Authentication for Distributed Web Caches
We consider the problem of offloading secure access-controlled content from central origin servers to distributed caches so clients can access a proximal cache rather than the orig...
James Giles, Reiner Sailer, Dinesh C. Verma, Sures...
EUROMICRO
2006
IEEE
15 years 3 months ago
Authentication in Stealth Distributed Hash Tables
Most existing DHT algorithms assume that all nodes have equal capabilities. This assumption has previously been shown to be untrue in real deployments, where the heterogeneity of ...
Andrew MacQuire, Andrew Brampton, Idris A. Rai, Ni...
PKC
2004
Springer
160views Cryptology» more  PKC 2004»
15 years 3 months ago
Constant Round Authenticated Group Key Agreement via Distributed Computation
Abstract. A group key agreement protocol allows a set of users, communicating over a public network, to agree on a private session key. Most of the schemes proposed so far require ...
Emmanuel Bresson, Dario Catalano
CRYPTO
1993
Springer
104views Cryptology» more  CRYPTO 1993»
15 years 1 months ago
Entity Authentication and Key Distribution
Mihir Bellare, Phillip Rogaway
ACISP
2001
Springer
15 years 1 months ago
Error Detection and Authentication in Quantum Key Distribution
Akihiro Yamamura, Hirokazu Ishizuka