Sciweavers

3899 search results - page 19 / 780
» Robust Image Hashing
Sort
View
ICC
2007
IEEE
105views Communications» more  ICC 2007»
15 years 4 months ago
Wheel of Trust: A Secure Framework for Overlay-Based Services
— The recent advances of distributed hash tables (DHTs) facilitate the development of highly scalable and robust network applications and services. However, with applications and...
Guor-Huar Lu, Zhi-Li Zhang
P2P
2007
IEEE
132views Communications» more  P2P 2007»
15 years 4 months ago
The Design and Evaluation of Techniques for Route Diversity in Distributed Hash Tables
To achieve higher efficiency over their unstructured counterparts, structured peer-to-peer systems hold each node responsible for serving a specified set of keys and correctly r...
Cyrus Harvesf, Douglas M. Blough
P2P
2007
IEEE
165views Communications» more  P2P 2007»
15 years 4 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
PVLDB
2008
127views more  PVLDB 2008»
14 years 9 months ago
Hashed samples: selectivity estimators for set similarity selection queries
We study selectivity estimation techniques for set similarity queries. A wide variety of similarity measures for sets have been proposed in the past. In this work we concentrate o...
Marios Hadjieleftheriou, Xiaohui Yu, Nick Koudas, ...
90
Voted
ICMCS
2009
IEEE
139views Multimedia» more  ICMCS 2009»
14 years 7 months ago
Evaluation of JPEG2000 hashing for efficient authentication
In this paper we investigate the applicability of different parts of the JPEG2000 codestream for authentication. Apart from the packet body different classes of information contai...
Dominik Engel, Thomas Stütz, Andreas Uhl