Sciweavers

2472 search results - page 50 / 495
» Parallel Key Exchange
Sort
View
IPPS
2008
IEEE
14 years 5 months ago
Introducing gravel: An MPI companion library
A non-trivial challenge in high performance, cluster computing is the communication overhead introduced by the cluster interconnect. A common strategy for addressing this challeng...
Anthony Danalis, Aaron Brown, Lori L. Pollock, D. ...
IPPS
2007
IEEE
14 years 5 months ago
Online Aggregation over Trees
Consider a distributed network with nodes arranged in a tree, and each node having a local value. We consider the problem of aggregating values (e.g., summing values) from all nod...
C. Greg Plaxton, Mitul Tiwari, Praveen Yalagandula
COLCOM
2009
IEEE
14 years 3 months ago
Still alive: Extending keep-alive intervals in P2P overlay networks
Abstract—Nodes within existing P2P networks typically exchange periodic keep-alive messages in order to maintain network connections between neighbours. This paper investigates a...
Richard Price, Peter Tiño
IJNSEC
2008
146views more  IJNSEC 2008»
13 years 10 months ago
Formal Protocol Design of ESIKE Based on Authentication Tests
In this paper, we first present a concrete formal protocol design approach, which is based on authentication tests, to create an Efficient and Secure Internet Key Exchange (ESIKE)...
Rui Jiang, Aiqun Hu, Jianhua Li
ISSADS
2005
Springer
14 years 4 months ago
Overview the Key Management in Ad Hoc Networks
The aim of this paper is to show some solutions for key management in ad hoc networks. The major problem in providing security services in such infrastructure less networks is how...
Gerardo del Valle, Roberto Gómez Cár...