Sciweavers

777 search results - page 29 / 156
» Secure broadcasting in large networks
Sort
View
ICDCSW
2003
IEEE
15 years 3 months ago
Foundations of Security for Hash Chains in Ad Hoc Networks
Nodes in ad hoc networks generally transmit data at regular intervals over long periods of time. Recently, ad hoc network nodes have been built that run on little power and have v...
Phillip G. Bradford, Olga V. Gavrylyako
CANS
2009
Springer
160views Cryptology» more  CANS 2009»
15 years 4 months ago
Short Hash-Based Signatures for Wireless Sensor Networks
We present a hash-based signature scheme customized for wireless sensor networks. For message lengths required by instructions or queries from the base station or single measuremen...
Erik Dahmen, Christoph Krauß
DIAU
2000
Springer
15 years 2 months ago
Freenet: A Distributed Anonymous Information Storage and Retrieval System
We describe Freenet, a peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity of both authors and readers...
Ian Clarke, Oskar Sandberg, Brandon Wiley, Theodor...
CCGRID
2008
IEEE
15 years 4 months ago
A Stable Broadcast Algorithm
—Distributing large data to many nodes, known as a broadcast or a multicast, is an important operation in parallel and distributed computing. Most previous broadcast algorithms e...
Kei Takahashi, Hideo Saito, Takeshi Shibata, Kenji...
LREC
2010
186views Education» more  LREC 2010»
14 years 11 months ago
The EPAC Corpus: Manual and Automatic Annotations of Conversational Speech in French Broadcast News
This paper presents the EPAC corpus which is composed by a set of 100 hours of conversational speech manually transcribed and by the outputs of automatic tools (automatic segmenta...
Yannick Estève, Thierry Bazillon, Jean-Yves...