Sciweavers

34 search results - page 3 / 7
» A DAA Scheme Requiring Less TPM Resources
Sort
View
INFOCOM
2006
IEEE
13 years 11 months ago
Resource Allocation for Multicast Services in Multicarrier Wireless Communications
— We consider a multicast resource allocation problem for the downlink in OFDM-based wireless cellular network systems. In a conventional multicast system, to accommodate users w...
Changho Suh, Jeonghoon Mo
ICISC
2007
134views Cryptology» more  ICISC 2007»
13 years 7 months ago
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
In Ubiquitous Computing Environment (UCE), service provider wants to provide its service to only legitimate users. Some users who belong to same service provider do not want to rev...
Jangseong Kim, Zeen Kim, Kwangjo Kim
ASIACRYPT
2000
Springer
13 years 10 months ago
Improved Methods to Perform Threshold RSA
Abstract. A t out of n threshold scheme is such that shares are distributed to n participants so that any set of t participants can compute the secret, whereas any set of less than...
Brian King
CGO
2004
IEEE
13 years 9 months ago
A Compiler Scheme for Reusing Intermediate Computation Results
Recent research has shown that programs often exhibit value locality. Such locality occurs when a code segment, although executed repeatedly in the program, takes only a small num...
Yonghua Ding, Zhiyuan Li
INFOCOM
2012
IEEE
11 years 8 months ago
Cuckoo sampling: Robust collection of flow aggregates under a fixed memory budget
—Collecting per-flow aggregates in high-speed links is challenging and usually requires traffic sampling to handle peak rates and extreme traffic mixes. Static selection of sa...
Josep Sanjuàs-Cuxart, Pere Barlet-Ros, Nick...