Sciweavers

5891 search results - page 63 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
144
Voted
P2P
2006
IEEE
130views Communications» more  P2P 2006»
15 years 9 months ago
The Effect of Replica Placement on Routing Robustness in Distributed Hash Tables
To achieve higher efficiency over their unstructured counterparts, structured peer-to-peer systems hold each node responsible for serving a specified set of keys and correctly r...
Cyrus Harvesf, Douglas M. Blough
129
Voted
ICNP
2003
IEEE
15 years 9 months ago
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized autho...
Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi
131
Voted
ICDCS
2002
IEEE
15 years 8 months ago
On the Performance of Group Key Agreement Protocols
Group key agreement is a fundamental building block for secure peer group communication systems. Several group key agreement protocols were proposed in the last decade, all of the...
Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene...
93
Voted
CONCURRENCY
2006
45views more  CONCURRENCY 2006»
15 years 3 months ago
Distributed loop-scheduling schemes for heterogeneous computer systems
Anthony T. Chronopoulos, Satish Penmatsa, Jianhua ...
129
Voted
IJCAI
2003
15 years 5 months ago
ODISET: On-line Distributed Session Tracing using Agents
When a security incident occurs it is sometimes necessary to identify its causes for legal and cautionary purposes. In an attempt to hide the origin of her connection, a malicious...
Salvador Mandujano, Arturo Galván