Sciweavers

648 search results - page 35 / 130
» Authenticated hash tables
Sort
View
IPTPS
2004
Springer
14 years 2 months ago
When Multi-hop Peer-to-Peer Lookup Matters
Distributed hash tables have been around for a long time [5, 7]. A number of recent projects propose peerto-peer DHTs, based on multi-hop lookup optimizations. Some of these syste...
Rodrigo Rodrigues, Charles Blake
IPTPS
2004
Springer
14 years 2 months ago
UsenetDHT: A Low Overhead Usenet Server
UsenetDHT is a system that reduces the storage and bandwidth resources required to run a Usenet server by spreading the burden of data storage across participants. UsenetDHT distr...
Emil Sit, Frank Dabek, James Robertson
SEMWEB
2004
Springer
14 years 2 months ago
Constructing and Querying Peer-to-Peer Warehouses of XML Resources
We present KADOP, a distributed infrastructure for warehousing XML resources in a peer-to-peer framework. KADOP allows users to build a shared, distributed repository of resources...
Serge Abiteboul, Ioana Manolescu, Nicoleta Preda
ASIACRYPT
2007
Springer
14 years 23 days ago
On Efficient Message Authentication Via Block Cipher Design Techniques
In an effort to design a MAC scheme that is built using block cipher components and runs faster than the modes of operation for message authentication, Daemen and Rijmen have propo...
Goce Jakimoski, K. P. Subbalakshmi
CSREASAM
2006
13 years 10 months ago
A Study on DRM System for On/Off Line Key Authentication
- This paper proposes a Hash Chain algorithm to create a key safer than the existing encryption method, and suggests an encryption method of higher security than the existing syste...
Kun-Won Jang, Chan-Kil Park, Jung-Jae Kim, Moon-Se...