Sciweavers

59 search results - page 6 / 12
» Locality-sensitive hashing scheme based on p-stable distribu...
Sort
View
ADBIS
1998
Springer
180views Database» more  ADBIS 1998»
15 years 3 months ago
Designing Persistence for Real-Time Distributed Object Systems
An implementation of persistent object store for real-time systems with strict processing time constraints is a challenging task, because many traditional database techniques, e.g....
Igor Nekrestyanov, Boris Novikov, Ekaterina Pavlov...
AIMS
2009
Springer
15 years 4 months ago
Evaluation of Sybil Attacks Protection Schemes in KAD
In this paper, we assess the protection mechanisms entered into recent clients to fight against the Sybil attack in KAD, a widely deployed Distributed Hash Table. We study three m...
Thibault Cholez, Isabelle Chrisment, Olivier Festo...
87
Voted
COCO
2007
Springer
88views Algorithms» more  COCO 2007»
15 years 5 months ago
A New Interactive Hashing Theorem
Interactive hashing, introduced by Naor, Ostrovsky, Venkatesan and Yung (CRYPTO ’92), plays an important role in many cryptographic protocols. In particular, it is a major compo...
Iftach Haitner, Omer Reingold
CRYPTO
2010
Springer
189views Cryptology» more  CRYPTO 2010»
14 years 9 months ago
Instantiability of RSA-OAEP under Chosen-Plaintext Attack
We show that the widely deployed RSA-OAEP encryption scheme of Bellare and Rogaway (Eurocrypt 1994), which combines RSA with two rounds of an underlying Feistel network whose hash...
Eike Kiltz, Adam O'Neill, Adam Smith
INFOCOM
2005
IEEE
15 years 5 months ago
FISSIONE: a scalable constant degree and low congestion DHT scheme based on Kautz graphs
Abstract— The distributed hash table (DHT) scheme has become the core component of many large-scale peer-to-peer networks. Degree, diameter, and congestion are important measures...
Dongsheng Li, Xicheng Lu, Jie Wu