Sciweavers

648 search results - page 22 / 130
» Authenticated hash tables
Sort
View
GI
2004
Springer
14 years 2 months ago
On the Use of Structured P2P Indexing Mechanisms in Mobile Ad-Hoc Scenarios
Abstract: Recently, Distributed Hash Tables evolved to a preferred approach for decentralized data management in widely distributed systems. Due to their crucial characteristics â€...
Tobias Heer, Heiko Niedermayer, Leo Petrak, Simon ...
ICMCS
2009
IEEE
139views Multimedia» more  ICMCS 2009»
13 years 6 months ago
Evaluation of JPEG2000 hashing for efficient authentication
In this paper we investigate the applicability of different parts of the JPEG2000 codestream for authentication. Apart from the packet body different classes of information contai...
Dominik Engel, Thomas Stütz, Andreas Uhl
SIGOPS
1998
123views more  SIGOPS 1998»
13 years 8 months ago
A New Family of Authentication Protocols
Abstract. We present a related family of authentication and digital signature protocols based on symmetric cryptographic primitives which perform substantially better than previous...
Ross J. Anderson, Francesco Bergadano, Bruno Crisp...
CIC
2003
140views Communications» more  CIC 2003»
13 years 10 months ago
Magic Square: Scalable Peer-to-Peer Lookup Protocol Considering Peer's Characteristics
One of the research problems in P2P computing is to look up and store the resource efficiently. The recent algorithms developed by several research groups for the lookup problem p...
Sun-Mi Park, Il-dong Jung, Dong-joo Song, Young-su...
EUROCAST
2007
Springer
108views Hardware» more  EUROCAST 2007»
14 years 2 months ago
A Systems Theoretic Approach to the Design of Scalable Cryptographic Hash Functions
Cryptographic hash functions are security primitives that compute check sums of messages in a strong manner and this way are of fundamental importance for ensuring integrity and au...
Josef Scharinger