Group-Interest-Based Verifiable CCN

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evaluating CCN multi-path interest forwarding strategies

This work addresses the performance evaluation of Content Centric Networks (CCN). Focusing on a realistic YouTube-like catalog, we conduct a thorough simulation study of the main system performance, focusing on multi-path interest forwarding strategies but considering several other ingredients such as network topology, content popularity, caching decisions and replacement policies. Summarizing ...

متن کامل

Buying Group Design Considering the Member’s Interest

Enhancing the speed and competition in an exhibition of services and products motivated the companies to provide high-quality products to the customers. One of the effective strategies to reach these goals is to create working groups. These groups can help the companies to improve the quality and exposure of their services along with reducing the costs. This approach is applicable in the health...

متن کامل

Interest-Based Peer-to-Peer Group Management

Peer-to-Peer systems become popular applications but suffer from insufficient resource availability which is caused by free-riders and inefficient lookup algorithms. To address the first cause, a number of recent works have focused on providing appropriate incentive mechanisms to encourage participants to contribute their resources to the P2P systems. To improve the lookup efficiency, locality-...

متن کامل

Publicly Verifiable Privacy-Preserving Group Decryption

Anonymity is one of the main concerns in group-oriented cryptography. However, most efforts, for instance, group signatures and ring signatures, are only made to provide anonymity on the sender’s side. There are merely few works done to ensure anonymity in a cryptographic sense on the recipient’s side in group-oriented communications. This paper formalizes the notion of group decryption (GD). I...

متن کامل

Verifiable Attribute Based Encryption

In this paper, we propose the notion of Verifiable Attribute-Based Encryption (VABE) and give two constructs of key-policy VABE. One is with a single authority, and the other is with multi authorities. Not only our schemes are proved secure as the previous ABE schemes, they also provide a verification property. This could not be trivially solved, such as trying random decryption. Adding the ver...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Mobile Information Systems

سال: 2016

ISSN: 1574-017X,1875-905X

DOI: 10.1155/2016/9202151