Sciweavers

105 search results - page 9 / 21
» A Universal Distribution Protocol for Video-on-Demand
Sort
View
CCS
2008
ACM
13 years 9 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
PODC
2004
ACM
14 years 24 days ago
Asynchronous group key exchange with failures
Group key exchange protocols allow a group of servers communicating over an asynchronous network of point-to-point links to establish a common key, such that an adversary which fu...
Christian Cachin, Reto Strobl
DEBS
2010
ACM
13 years 11 months ago
Quilt: a patchwork of multicast regions
Network bottlenecks, firewalls, restrictions on IP Multicast availability and administrative policies have long prevented the use of multicast even where the fit seems obvious. ...
Qi Huang, Ymir Vigfusson, Ken Birman, Haoyuan Li
GCC
2003
Springer
14 years 17 days ago
Network Storage Management in Data Grid Environment
This paper presents the Network Storage Manager (NSM) developed in the Distributed Computing Laboratory at Jackson State University. NSM is designed as a Java-based, high-performan...
Shaofeng Yang, Zeyad Ali, Houssain Kettani, Vinti ...
FOCS
2006
IEEE
14 years 1 months ago
Secure Multiparty Quantum Computation with (Only) a Strict Honest Majority
Secret sharing and multiparty computation (also called “secure function evaluation”) are fundamental primitives in modern cryptography, allowing a group of mutually distrustfu...
Michael Ben-Or, Claude Crépeau, Daniel Gott...