Sciweavers

859 search results - page 149 / 172
» The Changing Face of Cryptography
Sort
View
101
Voted
INFOCOM
2005
IEEE
15 years 3 months ago
A performance vs. cost framework for evaluating DHT design tradeoffs under churn
Abstract— Protocols for distributed hash tables (DHTs) incorporate features to achieve low latency for lookup requests in the face of churn, continuous changes in membership. The...
Jinyang Li, Jeremy Stribling, Robert Morris, M. Fr...
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
15 years 3 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay
86
Voted
IICS
2005
Springer
15 years 3 months ago
Innovation Processes Revisited by Internet
Internet, far from being a simple technology, is truly changing our way of life. Just as the invention of the alphabet, or the printing, Internet is a fundamental technology that w...
Serge Soudoplatoff
ASSETS
2004
ACM
15 years 3 months ago
Semantic bookmarking for non-visual web access
Bookmarks are shortcuts that enable quick access of the desired Web content. They have become a standard feature in any browser and recent studies have shown that they can be very...
Saikat Mukherjee, I. V. Ramakrishnan, Michael Kife...
PODC
2004
ACM
15 years 3 months ago
Balanced binary trees for ID management and load balance in distributed hash tables
We present a low-cost, decentralized algorithm for ID management in distributed hash tables (DHTs) managed by a dynamic set of hosts. Each host is assigned an ID in the unit inter...
Gurmeet Singh Manku