Sciweavers

688 search results - page 54 / 138
» Network Coding Protocols for Secret Key Distribution
Sort
View
CCS
2009
ACM
16 years 5 months ago
Hidden credential retrieval from a reusable password
We revisit the venerable question of access credentials management, which concerns the techniques that we, humans with limited memory, must employ to safeguard our various access ...
Xavier Boyen
157
Voted
TKDE
2010
272views more  TKDE 2010»
15 years 3 months ago
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Prashant Dewan, Partha Dasgupta
ICC
1997
IEEE
133views Communications» more  ICC 1997»
15 years 8 months ago
MESH: Distributed Error Recovery for Multimedia Streams in Wide-Area Multicast Networks
This paper addresses support for nzulti-party multimedia applications delivered across datagram wide-area networks such as the Internet. Our approach is to develop a novel retrans...
Matthew T. Lucas, Bert J. Dempsey, Alfred C. Weave...
ICC
2008
IEEE
163views Communications» more  ICC 2008»
15 years 11 months ago
Network Coding Based Cooperative Peer-to-Peer Repair in Wireless Ad-Hoc Networks
— Cooperative Peer-to-Peer Repair (CPR) has been proposed to recover from packet losses incurred during 3G broadcast. CPR leverages the increasing presence of multi-homed mobile ...
Xin Liu, Saqib Raza, Chen-Nee Chuah, Gene Cheung
CN
2007
99views more  CN 2007»
15 years 4 months ago
Design and implementation of a secure wide-area object middleware
Wide-area service replication is becoming increasingly common, with the emergence of new operational models such as content delivery networks and computational grids. This paper d...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...