Sciweavers

1251 search results - page 87 / 251
» On the security of group communication schemes
Sort
View
IWDC
2001
Springer
14 years 18 days ago
Fairness of a Single-Rate Multicast Congestion Control Scheme
Recently, a TCP-friendly, single-rate multicast congestion control scheme called pgmcc was introduced by one of the authors. In this paper, we study the fairness of pgmcc in a vari...
Gianluca Iannaccone, Luigi Rizzo
INFOCOM
2006
IEEE
14 years 2 months ago
Cooperative Security for Network Coding File Distribution
Abstract— Peer-to-peer content distribution networks can suffer from malicious participants that corrupt content. Current systems verify blocks with traditional cryptographic sig...
Christos Gkantsidis, Pablo Rodriguez
GLOBECOM
2010
IEEE
13 years 6 months ago
Stability and Performance Issues of a Relay Assisted Multiple Access Scheme
In this paper, we examine the operation of a node relaying packets from a number of users to a destination node. We assume that the relay does not have packets of its own, the traf...
Nikolaos Pappas, Apostolos Traganitis, Anthony Eph...
ITIIS
2008
128views more  ITIIS 2008»
13 years 8 months ago
An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks
In spite of previous common assumptions about the incompatibility of public key cryptography (PKC) schemes with wireless sensor networks (WSNs), recent works have shown that they ...
Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong S...
ICISC
2004
146views Cryptology» more  ICISC 2004»
13 years 9 months ago
Identity Based Threshold Ring Signature
In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n - t entities to generate a publicly verifiable t-out-of-n signature on behalf of ...
Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming ...