Sciweavers

106 search results - page 3 / 22
» Two New Efficient PIR-Writing Protocols
Sort
View
TCC
2009
Springer
255views Cryptology» more  TCC 2009»
14 years 6 months ago
LEGO for Two-Party Secure Computation
The first and still most popular solution for secure two-party computation relies on Yao's garbled circuits. Unfortunately, Yao's construction provide security only again...
Jesper Buus Nielsen, Claudio Orlandi
PRDC
2002
IEEE
13 years 10 months ago
Energy Efficient and Robust Multicast Protocol for Mobile Ad Hoc Networks
This paper reevaluates the multicast protocols for MANETs in terms of energy efficiency and proposes a new robust multicast protocol, called Two-Tree Multicast (TTM). Multicast pr...
Sangman Moh, Chansu Yu, Ben Lee, Hee Yong Youn
ICALP
2010
Springer
13 years 7 months ago
How Efficient Can Gossip Be? (On the Cost of Resilient Information Exchange)
Gossip protocols, also known as epidemic dissemination schemes, are becoming increasingly popular in distributed systems. Yet, it has remained a partially open question to determin...
Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Mort...
MOBIHOC
2001
ACM
14 years 5 months ago
Performance of a new Bluetooth scatternet formation protocol
A Bluetooth ad hoc network can be formed by interconnecting piconets into scatternets. The constraints and properties of Bluetooth scatternets present special challenges in formin...
Ching Law, Amar K. Mehta, Kai-Yeung Siu
ICC
2009
IEEE
14 years 16 days ago
A New Efficient Mechanism for Establishing IP Connectivity between Ambient Networks
—The changes in the communication paradigm envisioned for future networks, with peer-to-peer/symmetric attachments gaining momentum and two IP (Internet Protocol) versions coexis...
Rui Campos, Manuel Ricardo