Sciweavers

5891 search results - page 125 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
CCGRID
2006
IEEE
15 years 7 months ago
Policy-Based Access Control Framework for Grid Computing
Grid technology enables access and sharing of data and computational resources across administrative domains. Thus, it is important to provide a uniform access and management mech...
Jin Wu, Chokchai Leangsuksun, Vishal Rampure, Hong...
COMPGEOM
2004
ACM
15 years 7 months ago
Locality-sensitive hashing scheme based on p-stable distributions
We present a novel Locality-Sensitive Hashing scheme for the Approximate Nearest Neighbor Problem under ÐÔ norm, based on Ôstable distributions. Our scheme improves the running...
Mayur Datar, Nicole Immorlica, Piotr Indyk, Vahab ...
CSREASAM
2009
15 years 2 months ago
A Tripartite Strong Designated Verifier Scheme Based On Threshold RSA Signatures
In this paper we propose a new designated verifier signature scheme based on the threshold signature scheme presented [8] by Ghodosi and Pieprzyk. The advantages of the new scheme ...
Jerome Dossogne, Olivier Markowitch
CISS
2007
IEEE
15 years 8 months ago
A High-Throughput Cross-Layer Scheme for Distributed Wireless Ad Hoc Networks
— In wireless ad hoc networks, distributed nodes can collaboratively form an antenna array for long-distance communications to achieve high energy efficiency. In recent work, Oc...
Athina P. Petropulu, Lun Dong, H. Vincent Poor
ICNP
2002
IEEE
15 years 6 months ago
An Ultra-fast Shared Path Protection Scheme - Distributed Partial Information Management, Part II
— This paper describes a novel, ultra-fast heuristic algorithm to address an NP-hard optimization problem. One of its significances is that, for the first time, the paper shows...
Dahai Xu, Chunming Qiao, Yizhi Xiong