Sciweavers

1251 search results - page 151 / 251
» On the security of group communication schemes
Sort
View
VTC
2008
IEEE
136views Communications» more  VTC 2008»
14 years 2 months ago
Proportional Channel-Aware Packet Scheduling in Satellite Multimedia Broadcasting
— This paper studies the optimization techniques for scheduling multimedia packets in satellite digital multimedia broadcasting system, namely SDMB, in the presence of a return l...
Hongfei Du
TCC
2007
Springer
102views Cryptology» more  TCC 2007»
14 years 2 months ago
Perfect NIZK with Adaptive Soundness
Abstract. This paper presents a very simple and efficient adaptivelysound perfect NIZK argument system for any NP-language. In contrast to recently proposed schemes by Groth, Ostro...
Masayuki Abe, Serge Fehr
ICICS
2003
Springer
14 years 1 months ago
A Novel Two-Level Trust Model for Grid
Abstract. Trust is hard to establish in a service-oriented grid architecture because of the need to support end user single sign-on and dynamic transient service. In order to enhan...
Tieyan Li, Huafei Zhu, Kwok-Yan Lam
TCC
2009
Springer
141views Cryptology» more  TCC 2009»
14 years 9 months ago
Proofs of Retrievability via Hardness Amplification
Proofs of Retrievability (PoR), introduced by Juels and Kaliski [JK07], allow the client to store a file F on an untrusted server, and later run an efficient audit protocol in whi...
Yevgeniy Dodis, Salil P. Vadhan, Daniel Wichs
NGC
2001
Springer
196views Communications» more  NGC 2001»
14 years 24 days ago
Application-Level Multicast Using Content-Addressable Networks
Abstract. Most currently proposed solutions to application-level multicast organize the group members into an application-level mesh over which a DistanceVector routing protocol, o...
Sylvia Ratnasamy, Mark Handley, Richard M. Karp, S...