Sciweavers

1087 search results - page 117 / 218
» Distributed Oblivious Transfer
Sort
View
112
Voted
IPPS
2006
IEEE
15 years 8 months ago
Shubac: a searchable P2P network utilizing dynamic paths for client/server anonymity
A general approach to achieve anonymity on P2P networks is to construct an indirect path between client and server for each data transfer. The indirection, together with randomnes...
A. Brodie, Cheng-Zhong Xu, Weisong Shi
HICSS
2005
IEEE
148views Biometrics» more  HICSS 2005»
15 years 8 months ago
Public-Key-Infrastructure Based on a Peer-to-Peer Network
The goal of a Public-Key-Infrastructure (PKI) is to prove whether a cryptographic public key is authentic for a certain user. This information is crucial for the reliability of as...
Thomas Wölfl
PPSN
2004
Springer
15 years 8 months ago
Exploring the Evolutionary Details of a Feasible-Infeasible Two-Population GA
Abstract. A two-population Genetic Algorithm for constrained optimization is exercised and analyzed. One population consists of feasible candidate solutions evolving toward optimal...
Steven Orla Kimbrough, Ming Lu, David Harlan Wood
WORDS
2003
IEEE
15 years 7 months ago
Middleware Support for Multicast-based Data Dissemination: A Working Reality
Multicasting is an effective method to guarantee scalability of data transfer. Multicast applications range from the relief of Internet hot spots to healthcare alert systems. Much...
Panos K. Chrysanthis, Vincenzo Liberatore, Kirk Pr...
IPPS
2000
IEEE
15 years 7 months ago
Memory Management in a Combined VIA/SCI Hardware
Abstract In this document we make a brief review of memory management and DMA considerations in case of common SCI hardware and the Virtual Interface Architecture. On this basis we...
Mario Trams, Wolfgang Rehm, Daniel Balkanski, Stan...