Sciweavers

7329 search results - page 1272 / 1466
» Network Extractor Protocols
Sort
View
CCS
2004
ACM
15 years 9 months ago
Pong-cache poisoning in GUESS
This paper studies the problem of resource discovery in unstructured peer-to-peer (P2P) systems. We propose simple policies that make the discovery of resources resilient to coord...
Neil Daswani, Hector Garcia-Molina
EUC
2004
Springer
15 years 9 months ago
Invalidation for CORBA Caching in Wireless Devices
Wireless devices are widely used to get some information from the Internet. However, limited bandwidth, frequent disconnections and different communication protocols are most comm...
James Jayaputera, David Taniar
GCC
2004
Springer
15 years 9 months ago
Gemini: Probabilistic Routing Algorithm in Structured P2P Overlay
In this paper, we propose a new structured overlay protocol, which is more efficient and scalable than previous ones. We call it Gemini, because its routing table consists of two p...
Ming Li, Jinfeng Hu, Haitao Dong, Dongsheng Wang, ...
SCN
2004
Springer
121views Communications» more  SCN 2004»
15 years 9 months ago
ECRYPT: The Cryptographic Research Challenges for the Next Decade
Abstract. In the past thirty years, cryptology has evolved from a secret art to a modern science. Weaker algorithms and algorithms with short keys are disappearing, political contr...
Bart Preneel
DISCEX
2003
IEEE
15 years 9 months ago
Fault-Tolerant Mesh of Trust Applied to DNS Security
The Domain Name System is critical for the proper operation of applications on the Internet. Unfortunately, the DNS has a number of significant security weaknesses that can result...
Wes Griffin, Russ Mundy, Sam Weiler, Dan Massey, N...
« Prev « First page 1272 / 1466 Last » Next »