Recently, a TCP-friendly, single-rate multicast congestion control scheme called pgmcc was introduced by one of the authors. In this paper, we study the fairness of pgmcc in a vari...
Abstract— Peer-to-peer content distribution networks can suffer from malicious participants that corrupt content. Current systems verify blocks with traditional cryptographic sig...
In this paper, we examine the operation of a node relaying packets from a number of users to a destination node. We assume that the relay does not have packets of its own, the traf...
Nikolaos Pappas, Apostolos Traganitis, Anthony Eph...
In spite of previous common assumptions about the incompatibility of public key cryptography (PKC) schemes with wireless sensor networks (WSNs), recent works have shown that they ...
In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n - t entities to generate a publicly verifiable t-out-of-n signature on behalf of ...
Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming ...