Sciweavers

502 search results - page 10 / 101
» Deploying a New Hash Algorithm
Sort
View
SAINT
2006
IEEE
14 years 4 months ago
PaxonDHT: Achieving Consensus in Distributed Hash Tables
Despite the scalability, availability and resiliency potential suggested by Distributed Hash Tables, their lack of support for replication of mutable data and for strong consisten...
Ben Temkow, Anne-Marie Bosneag, Xinjie Li, Monica ...
EUROMICRO
2006
IEEE
14 years 4 months ago
Authentication in Stealth Distributed Hash Tables
Most existing DHT algorithms assume that all nodes have equal capabilities. This assumption has previously been shown to be untrue in real deployments, where the heterogeneity of ...
Andrew MacQuire, Andrew Brampton, Idris A. Rai, Ni...
ASAP
2010
IEEE
171views Hardware» more  ASAP 2010»
13 years 11 months ago
General-purpose FPGA platform for efficient encryption and hashing
Many applications require protection of secret or sensitive information, from sensor nodes and embedded applications to large distributed systems. The confidentiality of data can b...
Jakub Szefer, Yu-Yuan Chen, Ruby B. Lee
ESA
2009
Springer
149views Algorithms» more  ESA 2009»
14 years 5 months ago
3.5-Way Cuckoo Hashing for the Price of 2-and-a-Bit
The study of hashing is closely related to the analysis of balls and bins; items are hashed to memory locations much as balls are thrown into bins. In particular, Azar et. al. [2] ...
Eric Lehman, Rina Panigrahy
COMPUTER
2007
123views more  COMPUTER 2007»
13 years 10 months ago
Cryptography on a Speck of Dust
Ubiquitous computing has become a reality in recent years. Tiny wireless sensors and RFID tags are being deployed today and will soon form an important aspect of our infrastructur...
Jens-Peter Kaps, Gunnar Gaubatz, Berk Sunar