Group-Interest-Based Verifiable CCN
نویسندگان
چکیده
منابع مشابه
Evaluating CCN multi-path interest forwarding strategies
This work addresses the performance evaluation of Content Centric Networks (CCN). Focusing on a realistic YouTube-like catalog, we conduct a thorough simulation study of the main system performance, focusing on multi-path interest forwarding strategies but considering several other ingredients such as network topology, content popularity, caching decisions and replacement policies. Summarizing ...
متن کاملBuying Group Design Considering the Member’s Interest
Enhancing the speed and competition in an exhibition of services and products motivated the companies to provide high-quality products to the customers. One of the effective strategies to reach these goals is to create working groups. These groups can help the companies to improve the quality and exposure of their services along with reducing the costs. This approach is applicable in the health...
متن کاملInterest-Based Peer-to-Peer Group Management
Peer-to-Peer systems become popular applications but suffer from insufficient resource availability which is caused by free-riders and inefficient lookup algorithms. To address the first cause, a number of recent works have focused on providing appropriate incentive mechanisms to encourage participants to contribute their resources to the P2P systems. To improve the lookup efficiency, locality-...
متن کاملPublicly Verifiable Privacy-Preserving Group Decryption
Anonymity is one of the main concerns in group-oriented cryptography. However, most efforts, for instance, group signatures and ring signatures, are only made to provide anonymity on the sender’s side. There are merely few works done to ensure anonymity in a cryptographic sense on the recipient’s side in group-oriented communications. This paper formalizes the notion of group decryption (GD). I...
متن کاملVerifiable Attribute Based Encryption
In this paper, we propose the notion of Verifiable Attribute-Based Encryption (VABE) and give two constructs of key-policy VABE. One is with a single authority, and the other is with multi authorities. Not only our schemes are proved secure as the previous ABE schemes, they also provide a verification property. This could not be trivially solved, such as trying random decryption. Adding the ver...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mobile Information Systems
سال: 2016
ISSN: 1574-017X,1875-905X
DOI: 10.1155/2016/9202151