Sciweavers

469 search results - page 41 / 94
» Using Secret Sharing for Searching in Encrypted Data
Sort
View
IPTPS
2005
Springer
14 years 1 months ago
The Bittorrent P2P File-Sharing System: Measurements and Analysis
Of the many P2P file-sharing prototypes in existence, BitTorrent is one of the few that has managed to attract millions of users. BitTorrent relies on other (global) components f...
Johan A. Pouwelse, Pawel Garbacki, Dick H. J. Epem...
TJS
2008
105views more  TJS 2008»
13 years 7 months ago
Using a relational database for scalable XML search
XML is a flexible and powerful tool that enables information and security sharing in heterogeneous environments. Scalable technologies are needed to effectively manage the growing...
Rebecca Cathey, Steven M. Beitzel, Eric C. Jensen,...
VLDB
2007
ACM
126views Database» more  VLDB 2007»
14 years 8 months ago
SOR: A Practical System for Ontology Storage, Reasoning and Search
Ontology, an explicit specification of shared conceptualization, has been increasingly used to define formal data semantics and improve data reusability and interoperability in en...
Chen Wang, Jean-Sébastien Brunner, Jing Lu,...
DASFAA
2005
IEEE
106views Database» more  DASFAA 2005»
14 years 1 months ago
Real Datasets for File-Sharing Peer-to-Peer Systems
The fundamental drawback of unstructured peer-to-peer (P2P) networks is the flooding-based query processing protocol that seriously limits their scalability. As a result, a signi...
Shen-Tat Goh, Panos Kalnis, Spiridon Bakiras, Kian...
CSFW
2007
IEEE
14 years 2 months ago
Security Analysis of Voice-over-IP Protocols
The transmission of voice communications as datagram packets over IP networks, commonly known as Voice-overIP (VoIP) telephony, is rapidly gaining wide acceptance. With private ph...
Prateek Gupta, Vitaly Shmatikov