Sciweavers

648 search results - page 18 / 130
» Authenticated hash tables
Sort
View
PERCOM
2006
ACM
16 years 2 months ago
Adapting Distributed Hash Tables for Mobile Ad Hoc Networks
Tobias Heer, Stefan Götz, Simon Rieche, Klaus...
SSS
2009
Springer
144views Control Systems» more  SSS 2009»
15 years 10 months ago
Churn-Resilient Replication Strategy for Peer-to-Peer Distributed Hash-Tables
Abstract. DHT-based P2P systems provide a fault-tolerant and scalable mean to store data blocks in a fully distributed way. Unfortunately, recent studies have shown that if connect...
Sergey Legtchenko, Sébastien Monnet, Pierre...
94
Voted
SAINT
2008
IEEE
15 years 9 months ago
A Design for Distributed Backup and Migration of Distributed Hash Tables
Yusuke Doi, Shirou Wakayama, Satoshi Ozaki
59
Voted
ICC
2007
IEEE
15 years 9 months ago
Secure Bootstrapping of Distributed Hash Tables in Dynamic Wireless Networks
Lawrence Cheng, Kerry Jean, Roel Ocampo, Alex Gali...
82
Voted
ISCC
2007
IEEE
15 years 9 months ago
A Source Routing Solution to Non-Transitive Connectivity Problems in Distributed Hash Tables
Ivan Dedinski, Andreas Berl, Alexander Hofmann, Se...