Access control for secure distributed data structures in Distributed Hash Tables
暂无分享,去创建一个
Kalman Graffi | Raed Al-Aaridhi | Ahmed Yuksektepe | Kalman Graffi | Raed Al-Aaridhi | Ahmed Yuksektepe
[1] Michael Backes,et al. Secure Key-Updating for Lazy Revocation , 2006, ESORICS.
[2] Ralf Steinmetz,et al. A Distributed Platform for Multimedia Communities , 2008, 2008 Tenth IEEE International Symposium on Multimedia.
[3] Kalman Graffi,et al. Distributed data structures improvement for collective retrieval time , 2016, 2016 19th International Symposium on Wireless Personal Multimedia Communications (WPMC).
[4] Ralf Steinmetz,et al. LifeSocial.KOM: A secure and P2P-based solution for online social networks , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).
[5] Ralf Steinmetz,et al. LifeSocial.KOM: A P2P-Based Platform for Secure Online Social Networks , 2010, 2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P).
[6] Refik Molva,et al. Safebook: A distributed privacy preserving Online Social Network , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[7] Robert W. Shirey,et al. Internet Security Glossary, Version 2 , 2007, RFC.
[8] Kálmán György Graffi,et al. Monitoring and management of peer-to-peer systems , 2010, ACMMR.
[9] Gail-Joon Ahn,et al. Multiparty Authorization Framework for Data Sharing in Online Social Networks , 2011, DBSec.
[10] Reiner Kolla,et al. A Method for Self-Organizing Communication in WSN Based Localization Systems: HashSlot , 2007 .
[11] Ralf Steinmetz,et al. Overlay Bandwidth Management: Scheduling and Active Queue Management of Overlay Flows , 2007 .
[12] Kalman Graffi,et al. Sets, lists and trees: Distributed data structures on distributed hash tables , 2016, 2016 IEEE 35th International Performance Computing and Communications Conference (IPCCC).