Sciweavers

352 search results - page 49 / 71
» Distributing Key Updates in Secure Dynamic Groups
Sort
View
JASIS
2007
83views more  JASIS 2007»
13 years 7 months ago
Dynamic h-index: The Hirsch index in function of time
When we have a group of papers and when we fix the present time we can determine the unique number h being the number of papers that received h or more citations while the other p...
Leo Egghe
JUCS
2006
86views more  JUCS 2006»
13 years 7 months ago
Secure Service Discovery based on Trust Management for ad-hoc Networks
Abstract: In ad-hoc networks, mobile devices communicate via wireless links without the aid of any fixed networking infrastructure. These devices must be able to discover services ...
Celeste Campo, Florina Almenárez Mendoza, D...
SIGCOMM
2004
ACM
14 years 1 months ago
The feasibility of supporting large-scale live streaming applications with dynamic application end-points
While application end-point architectures have proven to be viable solutions for large-scale distributed applications such as distributed computing and file-sharing, there is lit...
Kunwadee Sripanidkulchai, Aditya Ganjam, Bruce M. ...
SASN
2003
ACM
14 years 28 days ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
CSREASAM
2003
13 years 9 months ago
Randomized Traitor Tracing Algorithms for Broadcast Security
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
Simon McNicol, Serdar Boztas