Sciweavers

658 search results - page 104 / 132
» The Grindahl Hash Functions
Sort
View
IPTPS
2004
Springer
15 years 3 months ago
On the Cost of Participating in a Peer-to-Peer Network
In this paper, we model the cost incurred by each peer participating in a peer-to-peer network. Such a cost model allows to gauge potential disincentives for peers to collaborate,...
Nicolas Christin, John Chuang
MATA
2004
Springer
113views Communications» more  MATA 2004»
15 years 3 months ago
PEARL: A PErformance evaluAtor of cRyptographic aLgorithms for Mobile Devices
Abstract. Limited computational power imposes new challenges during the implementation of security and privacy solutions for mobile devices. The choice for the most appropriate cry...
José Bringel Filho, Windson Viana, Rossana ...
ACSAC
2003
IEEE
15 years 3 months ago
Practical Random Number Generation in Software
There is a large gap between the theory and practice for random number generation. For example, on most operating systems, using /dev/random to generate a 256-bit AES key is highl...
John Viega
IAW
2003
IEEE
15 years 3 months ago
Assuring Consistency and Increasing Reliability in Group Communication Mechanisms in Computational Resiliency
— The Computational Resiliency library (CRLib) provides distributed systems with the ability to sustain operation and dynamically restore the level of assurance in system functio...
Norka B. Lucena, Steve J. Chapin, Joohan Lee
IPTPS
2003
Springer
15 years 2 months ago
Semantic-Free Referencing in Linked Distributed Systems
Every distributed system that employs linking requires a Reference Resolution Service (RRS) to convert link references to locations. We argue that the Web’s use of DNS for this ...
Hari Balakrishnan, Scott Shenker, Michael Walfish