Sciweavers

27 search results - page 2 / 6
» Private Information Retrieval in the Presence of Malicious F...
Sort
View
CORR
2010
Springer
432views Education» more  CORR 2010»
13 years 5 months ago
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks du...
Jaydip Sen
CCS
2010
ACM
13 years 9 months ago
Controlling data disclosure in computational PIR protocols
Private Information Retrieval (PIR) protocols allow users to learn data items stored at a server which is not fully trusted, without disclosing to the server the particular data e...
Ning Shang, Gabriel Ghinita, Yongbin Zhou, Elisa B...
ISADS
2003
IEEE
13 years 10 months ago
Mobile Agent Fault Tolerance for Information Retrieval Applications: An Exception Handling Approach
Maintaining mobile agent availability in the presence of agent server crashes is a challenging issue since developers normally have no control over remote agent servers. A popular...
Simon Pears, Jie Xu, Cornelia Boldyreff
PKC
2010
Springer
148views Cryptology» more  PKC 2010»
13 years 9 months ago
On the Feasibility of Consistent Computations
In many practical settings, participants are willing to deviate from the protocol only if they remain undetected. Aumann and Lindell introduced a concept of covert adversaries to f...
Sven Laur, Helger Lipmaa
ICNP
2003
IEEE
13 years 10 months ago
Mobile Distributed Information Retrieval for Highly-Partitioned Networks
We propose and evaluate a mobile, peer-to-peer Information Retrieval system. Such a system can, for example, support medical care in a disaster by allowing access to a large colle...
Katrina M. Hanna, Brian Neil Levine, R. Manmatha