نتایج جستجو برای: broadcast application
تعداد نتایج: 788973 فیلتر نتایج به سال:
Peer-to-peer overlay networks present new opportunities and challenges for achieving enhanced network functionality at the application level. In this paper we study the impact of point-to-point network latency on flooding broadcast operations in peer-topeer overlay networks. We show that two standard protocol mechanisms, used to control the amount of network resources used during flooding, can ...
Identity-based Broadcast Encryption (IBBE) has the inherent key escrow problem that Private Key Generator (PKG) can fully determine the user’s private key, which is an obstacle of the application of IBBE. The existing approaches to solving key escrow problem need the user to submit identity to multiple PKGs or interactions between PKG and the user in the private key extraction phase. For Point-...
the space now known as complete erdos space ec was introduced by paul erdos in 1940 as the closed subspace of the hilbert space ?2 consisting of all vectors such that every coordinate is in the convergent sequence {0} ? { 1 n : n ? n}. in a solution to a problem posed by lex g. oversteegen we present simple and useful topological characterizations of ec. as an application we determine the ...
This paper presents a HiPO (High-sPeed Orderpreserving broadcast) protocol which provides highthroughput group communication service on a highspeed single channel network like FDDI. By the HiPO protocol, every application entity can atomically receive all the messages broadcast in the group in the same order as they were sent. This service is an OP (orderpreserving broadcast) one. The execution...
Recently there has been increasing interest in the application of broadcast networks as high-bandwidth downstream channels of hybrid asymmetric communication platforms. This interest stems from an increasing number of mobile internet users demanding for high quality services whereas wireless networks still lack in bandwidth substantially. In this paper we introduce a proxy architecture enabling...
We proposed a new type of ID-based encryption scheme. Our scheme is different from other schemes on that we use tamper resistant smart card to store the private key and do the decryption job for the users. The user knows nothing about the private key. Our scheme is identical to ElGamal encryption scheme, but using RSA framework to avoid ID replacement attack. In a way, our scheme can be regarde...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید