Sciweavers

38 search results - page 7 / 8
» Identity Based Threshold Proxy Signcryption Scheme
Sort
View
SIGMOD
2002
ACM
134views Database» more  SIGMOD 2002»
14 years 4 months ago
Wavelet synopses with error guarantees
Recent work has demonstrated the effectiveness of the wavelet decomposition in reducing large amounts of data to compact sets of wavelet coefficients (termed "wavelet synopse...
Minos N. Garofalakis, Phillip B. Gibbons
VTC
2006
IEEE
13 years 10 months ago
Performance Analysis of a Rate-Adaptive Dual-Branch Switched Diversity System
Abstract— In this paper, a performance analysis of a dualbranch switched diversity system operating on identically distributed Nakagami-m fading channels is presented. An adaptiv...
Bengt Holter, Geir E. Øien
SRDS
2005
IEEE
13 years 10 months ago
Agile Store: Experience with Quorum-Based Data Replication Techniques for Adaptive Byzantine Fault Tolerance
Quorum protocols offer several benefits when used to maintain replicated data but techniques for reducing overheads associated with them have not been explored in detail. It is d...
Lei Kong, Deepak J. Manohar, Mustaque Ahamad, Arun...
ICISC
2004
147views Cryptology» more  ICISC 2004»
13 years 6 months ago
Batch Verifications with ID-Based Signatures
An identity (ID)-based signature scheme allows any pair of users to verify each other's signatures without exchanging public key certificates. With the advent of Bilinear maps...
HyoJin Yoon, Jung Hee Cheon, Yongdae Kim
TWC
2008
154views more  TWC 2008»
13 years 4 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...