• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 83
Next 10 →

Sirius: Securing remote untrusted storage

by Eu-jin Goh, Hovav Shacham, Nagendra Modadugu, Dan Boneh - in Proc. Network and Distributed Systems Security (NDSS) Symposium 2003 , 2003
"... This paper presents SiRiUS, a secure file system designed to be layered over insecure network and P2P file systems such as NFS, CIFS, OceanStore, and Yahoo! Briefcase. SiRiUS assumes the network storage is untrusted and provides its own read-write cryptographic access control for file level sharing. ..."
Abstract - Cited by 148 (2 self) - Add to MetaCart
This paper presents SiRiUS, a secure file system designed to be layered over insecure network and P2P file systems such as NFS, CIFS, OceanStore, and Yahoo! Briefcase. SiRiUS assumes the network storage is untrusted and provides its own read-write cryptographic access control for file level sharing

Robust Accounting in Decentralized P2P Storage Systems

by Ivan Osipkov, Peng Wang, Yongdae Kim
"... A peer-to-peer (P2P) storage system allows a network of peer computers to increase the availability of their data by replicating it on other peers in the network. In such networks, a central challenge is preventing “freeloaders”, or nodes that use disproportionately more storage on other peers than ..."
Abstract - Cited by 4 (1 self) - Add to MetaCart
A peer-to-peer (P2P) storage system allows a network of peer computers to increase the availability of their data by replicating it on other peers in the network. In such networks, a central challenge is preventing “freeloaders”, or nodes that use disproportionately more storage on other peers than

SW-R2P: A Trusted Small World Overlay P2P Network with Zero Knowledge Identification

by Yingjie Xia, Guanghua Song, Yao Zheng
"... Abstract—In order to implement both the efficiency and security in the Peer-to-Peer (P2P) network, we design a trusted small world overlay P2P network with the role based and reputation based access control policies, denoted as SW-R2P. The SW-R2P system integrates the small world topology with zero ..."
Abstract - Add to MetaCart
Abstract—In order to implement both the efficiency and security in the Peer-to-Peer (P2P) network, we design a trusted small world overlay P2P network with the role based and reputation based access control policies, denoted as SW-R2P. The SW-R2P system integrates the small world topology with zero

P2P Group Management Systems: A Conceptual Analysis

by Timo Koskela , Otso Kassinen , Erkki Harjula , Mika Ylianttila
"... Peer-to-Peer (P2P) networks are becoming eminent platforms for both distributed computing and interpersonal communication. Their role in contemporary multimedia content delivery and communication systems is strong, as witnessed by many popular applications and services. Groups in P2P systems can or ..."
Abstract - Add to MetaCart
and disadvantages of using each P2P system architecture for implementing P2P group management. The evaluation criteria in the analysis are performance, robustness, fairness, suitability for battery-powered devices, scalability, and security. The outcome of the analysis facilitates the selection of an appropriate P2

Security for Management Interfaces to Transport Network Elements oif2002.375.06 Contribution Number: oif2002.375.06 Working Group: OAM&P TITLE: Security for Management Interfaces to Transport Network Elements

by Brian Hazzard Photonex, Gary Buda, Booz Allen Hamilton, Renée Esposito, Booz Allen Hamilton , 2003
"... Project Number: oif2002.346.04 ABSTRACT: This IA lists objectives for securing OAM&P interfaces to a Transport Network Element and then specifies ways of using security systems (e.g., IPsec or TLS) for securing these interfaces. It summarizes how well each of the systems, used as specified, sati ..."
Abstract - Add to MetaCart
Project Number: oif2002.346.04 ABSTRACT: This IA lists objectives for securing OAM&P interfaces to a Transport Network Element and then specifies ways of using security systems (e.g., IPsec or TLS) for securing these interfaces. It summarizes how well each of the systems, used as specified

22.10.2009 Implementation of a Peer-to-Peer Multiplayer Game with Realtime Requirements

by Gutachten Alej, Ro Buchmann
"... Massively multiplayer online games (MMOGs) have become increasingly popular in the recent years, particularly in the form of online role-playing games (MMORPGs). These games support up to several ten thousand players interacting in a virtual game world. The current commercially successful games are ..."
Abstract - Add to MetaCart
serious alternative. This work analyzes the implementation of both a client-server and a peer-to-peer networking model for the prototype shooter game Planet π4. Initially, a survey introduces recent academic approaches to peer-to-peer systems specifically designed for games. Of those, one system

Name:

by Vorgelegt Am Januar, Oliver Schneider, Fachbereich Informatik, Oliver Schneider Contents
"... ..."
Abstract - Add to MetaCart
Abstract not found

DOCTEUR EN SCIENCES

by Bhaskar Biswas, Bhaskar Biswas , 2010
"... Implementational aspects of code-based cryptography ..."
Abstract - Add to MetaCart
Implementational aspects of code-based cryptography

A Security Architecture for Implementing Anonymity and Traceability In Wireless Mesh Network using Clustering Concept

by M. Jayanthi, M. A. Mukunthan
"... is expected to be widespread due to its low investment feature and the wireless broadband services it supports, attractive to both service providers and users. However, security issues inherent in WMNs need be considered before the deployment and proliferation of these networks, since it is unappeal ..."
Abstract - Add to MetaCart
for users to enjoy network services without being traced. While anonymity related issues have been extensively studied in payment-based systems such as e-cash and peer-to-peer (P2P) systems, little effort has been devoted to wireless mesh networks (WMNs). On the other hand, the network authority requires

Improving security By Quantum Cryptography in P2P Reputation Management in Distributed Identities and Decentralized Recommendation Chains

by V V Murali Babu Polukonda, A Harish
"... Abstract—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. consider several distributed collaborative key agreement and authentication protocols for dynamic peer groups. There are several important characteristi ..."
Abstract - Add to MetaCart
a distributed and collaborative approach for a dynamic peer group. In this paper presents quantum key distribution protocols (QKDPs) to safeguard security in large p2p networks, using in new directions in classical cryptography and quantum cryptography. Two mediator protocols, one with implicit user
Next 10 →
Results 1 - 10 of 83
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University