Sciweavers

104 search results - page 19 / 21
» Scalable Delay-constrained Multicast Group Key Management
Sort
View
CRYPTO
2005
Springer
97views Cryptology» more  CRYPTO 2005»
14 years 3 months ago
Generic Transformation for Scalable Broadcast Encryption Schemes
Broadcast encryption schemes allow a message sender to broadcast an encrypted data so that only legitimate receivers decrypt it. Because of the intrinsic nature of one-to-many comm...
Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim
SIGSOFT
2010
ACM
13 years 7 months ago
Building scalable software systems in the multicore era
Software systems must face two challenges today: growing complexity and increasing parallelism in the underlying computational models. The problem of increased complexity is often...
Hridesh Rajan
INFOCOM
2002
IEEE
14 years 2 months ago
Impromptu Measurement Infrastructures using RTP
— Dedicated infrastructures for end-to-end measurements are complex to deploy and manage. Equipment cost, the requirements for reporting bandwidth, and the administrative diversi...
Ramón Cáceres, Nick G. Duffield, Tim...
ACNS
2007
Springer
94views Cryptology» more  ACNS 2007»
14 years 4 months ago
Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme
The one-way function tree (OFT) scheme proposed by Balenson et. al is widely regarded as an efficient key management solution for multicast communication in large dynamic groups. ...
Xuxin Xu, Lingyu Wang, Amr M. Youssef, Bo Zhu
CISS
2008
IEEE
14 years 4 months ago
A linear integer programming approach to analyze P2P media streaming
Recent advancement in peer-to-peer (P2P) technologies has enabled a wide range of new applications. In this paper, we present mixed integer programming (MIP) formulations to analy...
Fulu Li, Jianwei Huang, Andrew Lippman