Sciweavers

1116 search results - page 109 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
87
Voted
JCM
2008
69views more  JCM 2008»
15 years 21 days ago
Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks
We present a scheme based on the Blom scheme for resisting the Sybil type attacks. In this scheme, the authority pre-distributes the combination of the secret used in the Blom sche...
Shiuh-Jeng Wang, Yuh-Ren Tsai, Chung-Wei Chen
107
Voted
NETWORKING
2004
15 years 2 months ago
On Dynamic Subset Difference Revocation Scheme
Subset Difference Revocation (SDR) [8] has been proposed to perform group rekeying in a stateless manner. However, statelessness comes at a cost in terms of storage and message ove...
Weifeng Chen, Zihui Ge, Chun Zhang, James F. Kuros...
107
Voted
WWW
2008
ACM
16 years 1 months ago
Understanding internet video sharing site workload: a view from data center design
In this paper we measured and analyzed the workload on Yahoo! Video, the 2nd largest U.S. video sharing site, to understand its nature and the impact on online video data center d...
Xiaozhu Kang, Hui Zhang 0002, Guofei Jiang, Haifen...
105
Voted
ICCS
2007
Springer
15 years 6 months ago
Securely Deliver Data by Multi-path Routing Scheme in Wireless Mesh Networks
Wireless Mesh Networks with static Transit Access Points (TAPs) have many advantages to connect different kinds of networks. While Mobile Ad hoc Networks still have many challenges...
Cao Trong Hieu, Choong Seon Hong
113
Voted
ESOP
2008
Springer
15 years 2 months ago
Open Bisimulation for the Concurrent Constraint Pi-Calculus
Abstract. The concurrent constraint pi-calculus (cc-pi-calculus) has been introduced as a model for concluding Service Level Agreements. The cc-pi calculus combines the synchronous...
Maria Grazia Buscemi, Ugo Montanari