Sciweavers

2644 search results - page 108 / 529
» Emerging Technology
Sort
View
WETICE
2009
IEEE
15 years 10 months ago
Secure Peer Sampling Service: The Mosquito Attack
Peer sampling – the capability of obtaining a random sample from a large population of peers – is a basic building block for the gossip paradigm. Current peer sampling service...
Gian Paolo Jesi, Alberto Montresor
WETICE
2009
IEEE
15 years 10 months ago
GeoIGM: A Location-Aware IGM Platform
—In recent years, peer-to-peer systems have gained traction in a number of important areas including; file-sharing, VoIP and scientific research vehicles such as the Grid. We a...
Neil Cowzer, Aaron J. Quigley
WETICE
2009
IEEE
15 years 10 months ago
Maintaining Unlinkability in Group Based P2P Environments
Abstract—In the wake of the success of peer-to-peer networking, privacy has arisen as a big concern. Even though steps have been taken in order to attain an anonymous communicati...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
NTMS
2009
IEEE
15 years 10 months ago
A Comprehensive Reference Architecture for Trustworthy Long-Term Archiving of Sensitive Data
Abstract—It is well known that the suitability of many cryptographic algorithms decreases with time. Hence, it is a challenging task to maintain the integrity, authenticity, con...
Detlef Hühnlein, Ulrike Korte, Lucie Langer, ...
MCETECH
2009
Springer
15 years 10 months ago
TwoStep: An Authentication Method Combining Text and Graphical Passwords
Text-based passwords alone are subject to dictionary attacks as users tend to choose weak passwords in favor of memorability, as well as phishing attacks. Many recognition-based gr...
Paul C. van Oorschot, Tao Wan