Sciweavers

127 search results - page 2 / 26
» A Generalization of DDH with Applications to Protocol Analys...
Sort
View
MM
2003
ACM
128views Multimedia» more  MM 2003»
13 years 10 months ago
Application of a content-based percussive sound synthesizer to packet loss recovery in music streaming
This paper presents a novel method to recover lost packets in music streaming using a synthesizer to generate percussive sounds. As an improvement of the state-of-the-art system t...
Lonce Wyse, Ye Wang, Xinglei Zhu
PODC
2012
ACM
11 years 7 months ago
Brief announcement: a calculus of policy-based routing systems
The BGP (Border Gateway Protocol) is the single inter-domain routing protocol that enables network operators within each autonomous system (AS) to influence routing decisions by ...
Anduo Wang, Carolyn L. Talcott, Alexander J. T. Gu...
TCC
2005
Springer
163views Cryptology» more  TCC 2005»
13 years 10 months ago
Adaptive Security of Symbolic Encryption
Abstract. We prove a computational soundness theorem for the symbolic analysis of cryptographic protocols which extends an analogous theorem of Abadi and Rogaway (J. of Cryptology ...
Daniele Micciancio, Saurabh Panjwani
IPPS
2007
IEEE
13 years 11 months ago
A Design and Analysis of a Hybrid Multicast Transport Protocol for the Haptic Virtual Reality Tracheotomy Tele-Surgery Applicati
Nowadays, distributed collaborative virtual environments are used in many scenarios such as tele-surgery, gaming, and industrial training, However several challenging issues remai...
Azzedine Boukerche, Haifa Maamar, Abuhoss Hossain
FC
2010
Springer
196views Cryptology» more  FC 2010»
13 years 9 months ago
Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis
Abstract. For the homomorphic Paillier cryptosystem we construct a protocol for secure modulo reduction, that on input of an encryption x with x of bit length x and a public ‘mod...
Jorge Guajardo, Bart Mennink, Berry Schoenmakers