Sciweavers

123 search results - page 25 / 25
» Multiple Identities in BitTorrent Networks
Sort
View
ACISP
2009
Springer
13 years 11 months ago
Building Key-Private Public-Key Encryption Schemes
In the setting of identity-based encryption with multiple trusted authorities, TA anonymity formally models the inability of an adversary to distinguish two ciphertexts correspondi...
Kenneth G. Paterson, Sriramkrishnan Srinivasan
GLOBECOM
2006
IEEE
13 years 10 months ago
Adaptive MIMO-OFDM Cellular System with Soft Handover between Distributed Base Station Antennas
— The joint cooperative processing of transmitted signal from several multiple-input multiple-output (MIMO) base station (BS) antenna heads is considered for users located within...
Antti Tölli, Marian Codreanu, Markku J. Juntt...
PET
2010
Springer
13 years 8 months ago
Making a Nymbler Nymble Using VERBS
In this work, we propose a new platform to enable service providers, such as web site operators, on the Internet to block past abusive users of anonymizing networks (for example, T...
Ryan Henry, Kevin Henry, Ian Goldberg