Sciweavers

5891 search results - page 63 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
P2P
2006
IEEE
130views Communications» more  P2P 2006»
15 years 7 months ago
The Effect of Replica Placement on Routing Robustness in Distributed Hash Tables
To achieve higher efficiency over their unstructured counterparts, structured peer-to-peer systems hold each node responsible for serving a specified set of keys and correctly r...
Cyrus Harvesf, Douglas M. Blough
ICNP
2003
IEEE
15 years 6 months ago
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized autho...
Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi
ICDCS
2002
IEEE
15 years 6 months ago
On the Performance of Group Key Agreement Protocols
Group key agreement is a fundamental building block for secure peer group communication systems. Several group key agreement protocols were proposed in the last decade, all of the...
Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene...
CONCURRENCY
2006
45views more  CONCURRENCY 2006»
15 years 1 months ago
Distributed loop-scheduling schemes for heterogeneous computer systems
Anthony T. Chronopoulos, Satish Penmatsa, Jianhua ...
IJCAI
2003
15 years 2 months ago
ODISET: On-line Distributed Session Tracing using Agents
When a security incident occurs it is sometimes necessary to identify its causes for legal and cautionary purposes. In an attempt to hide the origin of her connection, a malicious...
Salvador Mandujano, Arturo Galván