Sciweavers

879 search results - page 2 / 176
» Designing Closer to the Edge
Sort
View
ASIACRYPT
2010
Springer
13 years 3 months ago
A Closer Look at Anonymity and Robustness in Encryption Schemes
Abstract. In this work, we take a closer look at anonymity and robustness in encryption schemes. Roughly speaking, an anonymous encryption scheme hides the identity of the secret-k...
Payman Mohassel
SOUPS
2010
ACM
13 years 9 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
WWW
2003
ACM
13 years 10 months ago
Media Companion: Delivering Content-oriented Web Services to Internet Media
In the past few years we have seen a huge industrial investment on the development of content delivery networks (CDNs) which provide a large number of caches and storage devices a...
Wei-Ying Ma, Xing Xie, Chun Yuan, Yu Chen, Zheng Z...
FAW
2009
Springer
180views Algorithms» more  FAW 2009»
13 years 12 months ago
Edge Search Number of Cographs in Linear Time
We give a linear-time algorithm for computing the edge search number of cographs, thereby proving that this problem can be solved in polynomial time on this graph class. With our ...
Pinar Heggernes, Rodica Mihai
CCR
2006
98views more  CCR 2006»
13 years 5 months ago
Update on buffer sizing in internet routers
In the past two years, several papers have proposed rules that suggest two to five orders of magnitude reduction in Internet core router buffers. Others present scenarios where bu...
Yashar Ganjali, Nick McKeown