Sciweavers

49 search results - page 4 / 10
» Multicast Security: A Taxonomy and Some Efficient Constructi...
Sort
View
WWCA
1998
Springer
13 years 11 months ago
Compact and Flexible Resolution of CBT Multicast Key-Distribution
In an open network such as the Internet, multicast security services typically start with group session-key distribution. Considering scalability for group communication among wide...
Kanta Matsuura, Yuliang Zheng, Hideki Imai
TON
2008
126views more  TON 2008»
13 years 7 months ago
Hyperbolic embedding of internet graph for distance estimation and overlay construction
Estimating distances in the Internet has been studied in the recent years due to its ability to improve the performance of many applications, e.g., in the peer-topeer realm. One sc...
Yuval Shavitt, Tomer Tankel
CORR
2008
Springer
155views Education» more  CORR 2008»
13 years 7 months ago
On Wiretap Networks II
We consider the problem of securing a multicast network against a wiretapper that can intercept the packets on a limited number of arbitrary network links of his choice. We assume ...
Salim Y. El Rouayheb, Emina Soljanin
SIGMOD
2005
ACM
97views Database» more  SIGMOD 2005»
14 years 7 months ago
Incognito: Efficient Full-Domain K-Anonymity
A number of organizations publish microdata for purposes such as public health and demographic research. Although attributes that clearly identify individuals, such as Name and So...
Kristen LeFevre, David J. DeWitt, Raghu Ramakrishn...
ISM
2006
IEEE
132views Multimedia» more  ISM 2006»
13 years 7 months ago
BM-ALM: An Application Layer Multicasting with Behavior Monitoring Approach
IP multicasting is the most efficient way to perform group data distribution, as it eliminates traffic redundancy and improves bandwidth utilization. Application Layer Multicast (...
Dewan Tanvir Ahmed, Shervin Shirmohammadi