Sciweavers

5891 search results - page 211 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
ICDCS
2000
IEEE
15 years 9 months ago
Static and Adaptive Data Replication Algorithms for Fast Information Access in Large Distributed Systems
Creating replicas of frequently accessed objects across a read-intensive network can result in large bandwidth savings which, in turn, can lead to reduction in user response time....
Thanasis Loukopoulos, Ishfaq Ahmad
MOBIHOC
2008
ACM
16 years 4 months ago
Self-monitoring for sensor networks
Local monitoring is an effective mechanism for the security of wireless sensor networks (WSNs). Existing schemes assume the existence of sufficient number of active nodes to carry...
Dezun Dong, Yunhao Liu, Xiangke Liao
CORR
2010
Springer
116views Education» more  CORR 2010»
15 years 3 months ago
Progressive Decoding for Data Availability and Reliability in Distributed Networked Storage
—To harness the ever growing capacity and decreasing cost of storage, providing an abstraction of dependable storage in the presence of crash-stop and Byzantine failures is compu...
Yunghsiang Han, Soji Omiwade, Rong Zheng
EDCC
2005
Springer
15 years 10 months ago
Gracefully Degrading Fair Exchange with Security Modules
The fair exchange problem is key to trading electronic items in systems of mutually untrusted parties. In modern variants of such systems, each party is equipped with a security mo...
Gildas Avoine, Felix C. Gärtner, Rachid Guerr...
EUROCRYPT
2003
Springer
15 years 10 months ago
On the Security of RDSA
A variant of Schnorr’s signature scheme called RDSA has been proposed by I. Biehl, J. Buchmann, S. Hamdy and A. Meyer in order to be used in finite abelian groups of unknown ord...
Pierre-Alain Fouque, Guillaume Poupard