نتایج جستجو برای: sharing

تعداد نتایج: 87406  

Journal: :IACR Cryptology ePrint Archive 2005
Raylin Tso Ying Miao Takeshi Okamoto Eiji Okamoto

Verifiable secret sharing schemes proposed so far can only allow participants to verify whether their shares are correct or not. In this paper, we propose a new protocol which can allow participants not only to verify the correctness of their shares but also to revise the faulty shares. It is achieved in a cooperative way by participants, but without any assistance from the dealer. This protoco...

2001
Frank Dabek Emma Brunskill M. Frans Kaashoek David R. Karger Robert Tappan Morris Ion Stoica Hari Balakrishnan

We argue that the core problem facing peer-to-peer systems is locating documents in a decentralized network and propose Chord, a distributed lookup primitive. Chord provides an efficient method of locating documents while placing few constraints on the applications that use it. As proof that Chord’s functionality is useful in the development of peer-to-peer applications, we outline the implemen...

2010
Zheng Gong Qiang Tang Yee Wei Law Hongyang Chen

The constrained resources of sensors restrict the design of a key management scheme for wireless sensor networks (WSNs). In this work, we first formalize the security model of ALwEN, which is a gossipbased wireless medical sensor network (WMSN) for ambient assisted living. Our security model considers the node capture, the gossip-based network and the revocation problems, which should be valuab...

Journal: :Cambridge encyclopedia of anthropology 2021

Sharing is a particularly versatile and widespread human practice that features in all domains of life, including religion politics, family economics. It has long ethnographic record but it only recently reached centre stage social theory public awareness. However, not everything called ‘sharing’ qualifies as such comparative more technical sense. This entry seeks to distinguish sharing from ot...

‎The paper concerns interesting problems related to the field of Complex Analysis‎, ‎in particular, Nevanlinna theory of meromorphic‎ ‎functions‎. ‎We have studied certain uniqueness problem on differential polynomials of meromorphic functions sharing a‎ ‎small function‎. ‎Outside‎, ‎in this paper‎, ‎we also consider the uniqueness of $q-$ shift difference‎ - ‎differential polynomials‎ ‎of mero...

2010
Eitan Altman Philippe Nain Adam Shwartz Yuedong Xu

This work has two objectives. The first is to study rigorously the transient behavior of some P2P networks where information is replicated and disseminated according to an epidemic type dynamics. The second is to use the insight gained in order to predict how efficient are the measures taken against peer to peer networks. Two abstract models are considered to describe the P2P file sharing based...

Journal: :J. of Management Information Systems 2014
Thomas A. Weber

Electronic intermediaries have become pervasive in sales transactions for many durables, such as cars, power tools, and apartments. Yet only recently have they successfully tackled the challenge of enabling parties to share such goods. A key impediment to sharing is a lender’s concern about damage due to unobservable actions by a renter, usually resulting in moral hazard. This paper shows how a...

1993
Carlo Blundo Alfredo De Santis Luisa Gargano Ugo Vaccaro

A secret sharing scheme permits a secret to be shared among participants in such a way that only qualiied subsets of participants can recover the secret, but any non-qualiied subset has absolutely no information on the secret. In this paper we consider the problem of designing eecient secret sharing schemes having the additional feature that qualiied minorities can forbid any other set of parti...

2006
David Cabanillas Steven Willmott

File sharing networks are among the most popular applications of Peer-to-Peer (P2P) technology to date [3] and have been widely studied in terms of the performance, behavior, topology and other properties. A persistent theme throughout this research has been the evidence that many P2P file sharing systems rely on the presence of altruistic users, who provide files, network capacity or some othe...

2006
Matthias Fitzi Juan A. Garay Shyamnath Gollakota C. Pandu Rangan K. Srinathan

We consider perfect verifiable secret sharing (VSS) in a synchronous network of n processors (players) where a designated player called the dealer wishes to distribute a secret s among the players in a way that no t of them obtain any information, but any t + 1 players obtain full information about the secret. The round complexity of a VSS protocol is defined as the number of rounds performed i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید