Sciweavers

1102 search results - page 17 / 221
» Distributed Key Generation for the Internet
Sort
View
CN
2007
95views more  CN 2007»
13 years 7 months ago
Sampling large Internet topologies for simulation purposes
In this paper, we develop methods to ‘‘sample’’ a small realistic graph from a large Internet topology. Despite recent activity, modeling and generation of realistic graph...
Vaishnavi Krishnamurthy, Michalis Faloutsos, Marek...
AINA
2009
IEEE
14 years 20 days ago
Identity-Based Cryptography for Securing Mobile Phone Calls
In this paper, an identity-based key agreement system for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to ...
Matthew Smith, Christian Schridde, Björn Agel...
CCR
2002
130views more  CCR 2002»
13 years 7 months ago
Network topologies, power laws, and hierarchy
It has long been thought that the Internet, and its constituent networks, are hierarchical in nature. Consequently, the network topology generators most widely used by the Interne...
Hongsuda Tangmunarunkit, Ramesh Govindan, Sugih Ja...
AINA
2009
IEEE
14 years 2 months ago
TopDNS: Experiences Building Internet-Based Topologies with GNP
Building realistic Internet topologies is an important step towards predicting the behavior of new distributed applications and protocols. We are creating topologies that predict ...
Gert Pfeifer, Christof Fetzer
IPPS
2006
IEEE
14 years 1 months ago
Executing MPI programs on virtual machines in an Internet sharing system
Internet sharing systems aim at federating and utilizing distributed computing resources across the Internet. This paper presents a user-level virtual machine (VM) approach to MPI...
Zhelong Pan, Xiaojuan Ren, Rudolf Eigenmann, Dongy...