Sciweavers

4438 search results - page 31 / 888
» On the Distribution of Keys by Hashing
Sort
View
CTRSA
2010
Springer
169views Cryptology» more  CTRSA 2010»
15 years 6 months ago
Hash Function Combiners in TLS and SSL
Abstract. The TLS and SSL protocols are widely used to ensure secure communication over an untrusted network. Therein, a client and server first engage in the so-called handshake ...
Marc Fischlin, Anja Lehmann, Daniel Wagner
FCSC
2007
131views more  FCSC 2007»
14 years 11 months ago
SONNET: subscription using path queries over structured overlay networks
Application-level content-based routing using XML is a key technology for decentralized publish/subscribe systems. In this paper, a new approach is proposed to support the efficien...
Weining Qian, Linhao Xu, Aoying Zhou, Minqi Zhou
ICDCS
2008
IEEE
15 years 6 months ago
Fast Path Session Creation on Network Processors
The security gateways today are required not only to block unauthorized accesses by authenticating packet headers, but also by inspecting connection states to defend against malic...
Bo Xu, Yaxuan Qi, Fei He, Zongwei Zhou, Yibo Xue, ...
ERCIMDL
2005
Springer
91views Education» more  ERCIMDL 2005»
15 years 5 months ago
LibraRing: An Architecture for Distributed Digital Libraries Based on DHTs
We present a digital library architecture based on distributed hash tables. We discuss the main components of this architecture and the protocols for offering information retrieva...
Christos Tryfonopoulos, Stratos Idreos, Manolis Ko...
98
Voted
ICDE
1987
IEEE
81views Database» more  ICDE 1987»
15 years 3 months ago
Multidimensional Dynamic Quantile Hashing is Very Efficient for Non-Uniform Record Distributions
: Previous multidimensional dynamic hashing schemes exhibit two obvious shortcomings. First, even for uniform record distribution, the retrieval performance of these schemes suffer...
Hans-Peter Kriegel, Bernhard Seeger