Sciweavers

3972 search results - page 87 / 795
» Design of the iSCSI Protocol
Sort
View
CANS
2009
Springer
132views Cryptology» more  CANS 2009»
14 years 2 months ago
Fully Robust Tree-Diffie-Hellman Group Key Exchange
We extend the well-known Tree-Diffie-Hellman technique used for the design of group key exchange (GKE) protocols with robustness, i.e. with resistance to faults resulting from poss...
Timo Brecher, Emmanuel Bresson, Mark Manulis
IMSA
2001
132views Multimedia» more  IMSA 2001»
13 years 11 months ago
Performance of Zebra Routing Software
Zebra is publicly available free routing software that is distributed under GNU General Public License. It supports the following IP routing protocols: BGP-4, RIPv1, RIPv2 and OSP...
R. Fatoohi, R. Singh
TMC
2010
130views more  TMC 2010»
13 years 8 months ago
Efficient Coverage Maintenance Based on Probabilistic Distributed Detection
—Many wireless sensor networks require sufficient sensing coverage over long periods of time. To conserve energy, a coverage maintenance protocol achieves desired coverage by act...
Guoliang Xing, Xiangmao Chang, Chenyang Lu, Jianpi...
TDP
2010
166views more  TDP 2010»
13 years 4 months ago
Communication-Efficient Privacy-Preserving Clustering
The ability to store vast quantities of data and the emergence of high speed networking have led to intense interest in distributed data mining. However, privacy concerns, as well ...
Geetha Jagannathan, Krishnan Pillaipakkamnatt, Reb...
CRYPTO
2012
Springer
223views Cryptology» more  CRYPTO 2012»
12 years 18 days ago
Collusion-Preserving Computation
In collusion-free protocols, subliminal communication is impossible and parties are thus unable to communicate “any information beyond what the protocol allows”. Collusion-fre...
Joël Alwen, Jonathan Katz, Ueli Maurer, Vassi...