Sciweavers

648 search results - page 18 / 130
» Authenticated hash tables
Sort
View
PERCOM
2006
ACM
14 years 8 months ago
Adapting Distributed Hash Tables for Mobile Ad Hoc Networks
Tobias Heer, Stefan Götz, Simon Rieche, Klaus...
SSS
2009
Springer
144views Control Systems» more  SSS 2009»
14 years 3 months ago
Churn-Resilient Replication Strategy for Peer-to-Peer Distributed Hash-Tables
Abstract. DHT-based P2P systems provide a fault-tolerant and scalable mean to store data blocks in a fully distributed way. Unfortunately, recent studies have shown that if connect...
Sergey Legtchenko, Sébastien Monnet, Pierre...
ICC
2007
IEEE
14 years 3 months ago
Secure Bootstrapping of Distributed Hash Tables in Dynamic Wireless Networks
Lawrence Cheng, Kerry Jean, Roel Ocampo, Alex Gali...