Sciweavers

27 search results - page 2 / 6
» Efficient Broadcast Encryption Using Multiple Interpolation ...
Sort
View
CAISE
2006
Springer
13 years 8 months ago
An Efficient Approach to Support Querying Secure Outsourced XML Information
Abstract. Data security is well-recognized a vital issue in an information system that is supported in an outsource environment. However, most of conventional XML encryption propos...
Yin Yang, Wilfred Ng, Ho Lam Lau, James Cheng
CGVR
2006
13 years 6 months ago
Interpolation-Friendly Soft Shadow Maps
We present Penumbra Limit Maps, a technique for rendering soft shadows from a modified shadow map. The shadow representation used by our method has excellent interpolation propert...
Orion Sky Lawlor
WOWMOM
2006
ACM
118views Multimedia» more  WOWMOM 2006»
13 years 10 months ago
Evaluating Different One to Many Packet Delivery Schemes for UMTS
It is known that multicasting is an efficient method of supporting group communication as it allows the transmission of packets to multiple destinations using fewer network resour...
Antonios G. Alexiou, Dimitrios Antonellis, Christo...
IACR
2011
124views more  IACR 2011»
12 years 4 months ago
Efficient Multicast Key Distribution Using HOWF-based Access Control Structures
— Both broadcast encryption (BE) protocols and multicast key distribution (MKD) protocols try to solve the same problem of private group communication. For the first time, we dis...
Jing Liu, Qiong Huang, Bo Yang
PIMRC
2010
IEEE
13 years 2 months ago
A multi-threshold scheme for feedback load reduction in multiuser MIMO broadcast channel
In a multiuser system, independent time-varying channels among different users can be exploited to provide multiuser diversity (MUD) gain and increase the system throughput. For th...
Jin-Hao Li, Hsuan-Jung Su, Yu-Lun Tsai