Sciweavers

648 search results - page 1 / 130
» The GCHQ Protocol and Its Problems
Sort
View
EUROCRYPT
1997
Springer
13 years 9 months ago
The GCHQ Protocol and Its Problems
The UK government is fielding an architecture for secure electronic mail based on the NSA’s Message Security Protocol, with a key escrow scheme inspired by Diffie-Hellman. Attem...
Ross J. Anderson, Michael Roe
PODC
2003
ACM
13 years 10 months ago
An asynchronous protocol for distributed computation of RSA inverses and its applications
This paper presents an efficient asynchronous protocol to compute RSA inverses with respect to a public RSA modulus N whose factorization is secret and shared among a group of pa...
Christian Cachin
ICC
2007
IEEE
13 years 11 months ago
A Multilink Protocol with the Per Flow Resequencing and Its Performance Evaluation
Abstract— Procedures that provide a virtual link service aggregating bandwidths of multiple physical links are called a multilink protocol. The multilink protocol enables to util...
Toshihiro Shikama, Takashi Watanabe, Tadanori Mizu...
FAW
2009
Springer
144views Algorithms» more  FAW 2009»
13 years 10 months ago
Communication Complexity and Its Applications
Here we prove an asymptotically optimal lower bound on the information complexity of the k-party disjointness function with the unique intersection promise, an important special ca...
Andrew Chi-Chih Yao
INFOCOM
2008
IEEE
13 years 11 months ago
The Meandering Current Mobility Model and its Impact on Underwater Mobile Sensor Networks
—Underwater mobile acoustic sensor networks are promising tools for the exploration of the oceans. These networks require new robust solutions for fundamental issues such as: loc...
Antonio Caruso, Francesco Paparella, Luiz Filipe M...