Sciweavers

231 search results - page 36 / 47
» Generalized Identity Based and Broadcast Encryption Schemes
Sort
View
86
Voted
WWW
2004
ACM
16 years 11 days ago
Pride: peer-to-peer reputation infrastructure for decentralized environments
Peer-to-peer (P2P) networks use the fundamental assumption that the nodes in the network will cooperate and will not cheat. In the absence of any common goals shared by the nodes ...
Prashant Dewan, Partha Dasgupta
CCS
2008
ACM
15 years 1 months ago
Efficient attributes for anonymous credentials
We extend the Camenisch-Lysyanskaya anonymous credential system such that selective disclosure of attributes becomes highly efficient. The resulting system significantly improves ...
Jan Camenisch, Thomas Groß
INFOCOM
2006
IEEE
15 years 5 months ago
Data Synchronization Methods Based on ShuffleNet and Hypercube for Networked Information Systems
– In contrast to a typical single source of data updates in Internet applications, data files in a networked information system are often distributed, replicated, accessed and up...
David J. Houck, Kin K. Leung, Peter Winkler
DAM
2008
99views more  DAM 2008»
14 years 11 months ago
Boundary value problems on weighted networks
We present here a systematic study of general boundary value problems on weighted networks that includes the variational formulation of such problems. In particular, we obtain the...
Enrique Bendito, Angeles Carmona, Andrés M....
SC
2003
ACM
15 years 5 months ago
Scalable Hardware-Based Multicast Trees
This paper presents an algorithm for implementing optimal hardware-based multicast trees, on networks that provide hardware support for collective communication. Although the prop...
Salvador Coll, José Duato, Fabrizio Petrini...