Sciweavers

923 search results - page 153 / 185
» Improved Slide Attacks
Sort
View
INFOCOM
2007
IEEE
14 years 5 months ago
Scalable Secure Bidirectional Group Communication
— Many network applications are based on a group communications model where one party sends messages to a large number of authorized recipients and/or receives messages from mult...
Yitao Duan, John F. Canny
INFOCOM
2007
IEEE
14 years 5 months ago
Ranking-Based Optimal Resource Allocation in Peer-to-Peer Networks
—This paper presents a theoretic framework of optimal resource allocation and admission control for peer-topeer networks. Peer’s behavioral rankings are incorporated into the r...
Yonghe Yan, Adel El-Atawy, Ehab Al-Shaer
IPPS
2007
IEEE
14 years 5 months ago
Combining Compression, Encryption and Fault-tolerant Coding for Distributed Storage
Storing data in distributed systems aims to offer higher bandwidth and scalability than storing locally. But, a couple of disadvantageous issues must be taken into account such as...
Peter Sobe, Kathrin Peter
P2P
2007
IEEE
165views Communications» more  P2P 2007»
14 years 5 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
AGTIVE
2007
Springer
14 years 5 months ago
A First Experimental Evaluation of Search Plan Driven Graph Pattern Matching
Abstract. With graph pattern matching the field of graph transformation (GT) includes an NP-complete subtask. But for real-life applications it is essential that graph pattern mat...
Gernot Veit Batz, Moritz Kroll, Rubino Geiß