Sciweavers

648 search results - page 55 / 130
» Authenticated hash tables
Sort
View
ASIAN
2004
Springer
69views Algorithms» more  ASIAN 2004»
14 years 3 months ago
Using Optimal Golomb Rulers for Minimizing Collisions in Closed Hashing
Abstract. We give conditions for hash table probing which minimize the expected number of collisions. A probing algorithm is determined by a sequence of numbers denoting jumps for ...
Lars Lundberg, Håkan Lennerstad, Kamilla Klo...
IPTPS
2003
Springer
14 years 3 months ago
Sloppy Hashing and Self-Organizing Clusters
We are building Coral, a peer-to-peer content distribution system. Coral creates self-organizing clusters of nodes that fetch information from each other to avoid communicating wi...
Michael J. Freedman, David Mazières
ICCSA
2010
Springer
14 years 4 months ago
Authentication - Based Medium Access Control to Prevent Protocol Jamming: A-MAC
Abstract. Recently, Wireless Local Area Network (WLAN) is used by enterprises, government, and the military, as well as small office and home offices. Although it is convenient, it...
Jaemin Jeung, Seungmyeong Jeong, Jaesung Lim
CRYPTO
1999
Springer
159views Cryptology» more  CRYPTO 1999»
14 years 2 months ago
UMAC: Fast and Secure Message Authentication
We describe a message authentication algorithm, UMAC, which can authenticate messages (in software, on contemporary machines) roughly an order of magnitude faster than current prac...
John Black, Shai Halevi, Hugo Krawczyk, Ted Krovet...
ADHOC
2007
134views more  ADHOC 2007»
13 years 9 months ago
Threshold password authentication against guessing attacks in Ad hoc networks
Password authentication has been accepted as one of the commonly used solutions in network environment to protect resources from unauthorized access. The emerging mobile Ad hoc ne...
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu