Sciweavers

648 search results - page 13 / 130
» The GCHQ Protocol and Its Problems
Sort
View
ICPADS
2007
IEEE
14 years 2 months ago
A semantic overlay network for unstructured peer-to-peer protocols
Peer-to-Peer computing has become a popular networking paradigm for file sharing, distributed computing, collaborative working, etc. The widely used unstructured Peer-to-Peer pro...
Junfeng Xie, Zhenhua Li, Guihai Chen
ICDCS
2005
IEEE
14 years 2 months ago
An Update Protocol for XML Documents in Distributed and Cooperative Systems
Securing data is becoming a crucial need for most internet-based applications. Whereas the problem of data confidentiality has been widely investigated, the problem of how to ens...
Yunhua Koglin, Giovanni Mella, Elisa Bertino, Elen...
WMASH
2004
ACM
14 years 2 months ago
Reputation-based Wi-Fi deployment protocols and security analysis
In recent years, wireless Internet service providers (WISPs) have established thousands of WiFi hot spots in cafes, hotels and airports in order to offer to travelling Internet u...
Naouel Ben Salem, Jean-Pierre Hubaux, Markus Jakob...
APPROX
2007
Springer
77views Algorithms» more  APPROX 2007»
14 years 2 months ago
High Entropy Random Selection Protocols
We study the two party problem of randomly selecting a string among all the strings of length n. We want the protocol to have the property that the output distribution has high en...
Harry Buhrman, Matthias Christandl, Michal Kouck&y...
JSS
2007
67views more  JSS 2007»
13 years 8 months ago
Worm-IT - A wormhole-based intrusion-tolerant group communication system
This paper presents Worm-IT, a new intrusion-tolerant group communication system with a membership service and a view-synchronous atomic multicast primitive. The system is intrusi...
Miguel Correia, Nuno Ferreira Neves, Lau Cheuk Lun...