Sciweavers

1080 search results - page 33 / 216
» Distributed Hash Tables
Sort
View
158
Voted
COMSNETS
2012
182views more  COMSNETS 2012»
13 years 10 months ago
Hierarchy-aware distributed overlays in data centers using DC2
—Popular online services such as social networks, e-commerce and bidding are routinely hosted in large-scale data centers. Group communication systems (e.g., multicast) and distr...
Karthik Nagaraj, Hitesh Khandelwal, Charles Edwin ...
132
Voted
FSE
2008
Springer
166views Cryptology» more  FSE 2008»
15 years 4 months ago
Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation
Hash functions are an important building block in almost all security applications. In the past few years, there have been major advances in the cryptanalysis of hash functions, es...
Yedidya Hilewitz, Yiqun Lisa Yin, Ruby B. Lee
100
Voted
KESAMSTA
2007
Springer
15 years 8 months ago
A Resource Discovery Method Based on Multi-agents in P2P Systems
A peer-to-peer (P2P) system consists of a number of decentralized distributed network nodes that are capable of sharing resources without centralized supervision. Many application...
Yasushi Kambayashi, Yoshikuni Harada
COMPSAC
2006
IEEE
15 years 6 months ago
Distributed Processes on Tree Hash
We propose Tree Hash to reduce bucket overflow, which is one of the inherent problems in dynamic hash techniques. In this investigation, we dicuss how to improve efficien cy of Tre...
Kyosuke Yasuda, Takao Miura, Isamu Shioya
150
Voted
ANSS
2008
IEEE
15 years 9 months ago
SCAR - Scattering, Concealing and Recovering Data within a DHT
This paper describes a secure and reliable method for storing data in a distributed hash table (DHT) leveraging the inherent properties of the DHT to provide a secure storage subs...
Bryan N. Mills, Taieb Znati