Sciweavers

ICISC
2009
146views Cryptology» more  ICISC 2009»
13 years 2 months ago
First CPIR Protocol with Data-Dependent Computation
We design a new (n, 1)-CPIR protocol BddCpir for -bit strings as a combination of a noncryptographic (BDD-based) data structure and a more basic cryptographic primitive (communicat...
Helger Lipmaa
WCNC
2010
IEEE
13 years 8 months ago
Quantifying the Overhead Due to Routing Probes in Multi-Rate WMNs
—The selection of high-throughput routes is a key element towards improving the performance of wireless multihop networks. While several routing metrics have been proposed in the...
Ioannis Broustis, Konstantinos Pelechrinis, Dimitr...
ICALP
2009
Springer
14 years 5 months ago
Online Computation with Advice
Adi Rosén, Amos Korman, Pierre Fraigniaud, ...