Sciweavers

162 search results - page 30 / 33
» A Group Signature Scheme from Lattice Assumptions
Sort
View
WAIFI
2010
Springer
158views Mathematics» more  WAIFI 2010»
14 years 8 months ago
On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings
Abstract. We focus on the implementation and security aspects of cryptographic protocols that use Type 1 and Type 4 pairings. On the implementation front, we report improved timing...
Sanjit Chatterjee, Darrel Hankerson, Alfred Meneze...
JSAC
2007
116views more  JSAC 2007»
14 years 10 months ago
GroCoca: group-based peer-to-peer cooperative caching in mobile environment
— In a mobile cooperative caching environment, we observe the need for cooperating peers to cache useful data items together, so as to improve cache hit from peers. This could be...
Chi-Yin Chow, Hong Va Leong, Alvin T. S. Chan
ICCD
2007
IEEE
145views Hardware» more  ICCD 2007»
15 years 7 months ago
Effective Dynamic Thermal Management for MPEG-4 decoding
This paper proposes Dynamic Thermal Management (DTM) based on a dynamic voltage and frequency scaling (DVFS) technique for MPEG-4 decoding to guarantee thermal safety while mainta...
Inchoon Yeo, Heung Ki Lee, Eun Jung Kim, Ki Hwan Y...
TON
2010
109views more  TON 2010»
14 years 9 months ago
Rendered path: range-free localization in anisotropic sensor networks with holes
Sensor positioning is a crucial part of many location-dependent applications that utilize wireless sensor networks (WSNs). Current localization approaches can be divided into two ...
Mo Li, Yunhao Liu
IACR
2011
88views more  IACR 2011»
13 years 10 months ago
Storing Secrets on Continually Leaky Devices
We consider the question of how to store a value secretly on devices that continually leak information about their internal state to an external attacker. If the secret value is s...
Yevgeniy Dodis, Allison B. Lewko, Brent Waters, Da...