Sciweavers

9186 search results - page 1620 / 1838
» A Module System for Scheme
Sort
View
132
Voted
PAIRING
2009
Springer
119views Cryptology» more  PAIRING 2009»
15 years 7 months ago
Compact E-Cash and Simulatable VRFs Revisited
Abstract. Efficient non-interactive zero-knowledge proofs are a powerful tool for solving many cryptographic problems. We apply the recent Groth-Sahai (GS) proof system for pairing...
Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, A...
IMC
2009
ACM
15 years 7 months ago
Geolocalization of proxied services and its application to fast-flux hidden servers
Fast-flux is a redirection technique used by cyber-criminals to hide the actual location of malicious servers. Its purpose is to evade identification and prevent or, at least de...
Claude Castelluccia, Mohamed Ali Kâafar, Per...
79
Voted
MOBICOM
2009
ACM
15 years 7 months ago
Order matters: transmission reordering in wireless networks
Modern wireless interfaces support a physical layer capability called Message in Message (MIM). Briefly, MIM allows a receiver to disengage from an ongoing reception, and engage ...
Justin Manweiler, Naveen Santhapuri, Souvik Sen, R...
73
Voted
BIBE
2008
IEEE
115views Bioinformatics» more  BIBE 2008»
15 years 7 months ago
The Mouse Resource Browser (MRB) - A near-complete registry of mouse resources
—The Mouse Resource Browser MRB (http://bioit.fleming.gr/mrb) is an easy-to-use database for searching and retrieving mouse resource information. Currently, MRB hosts a list of 2...
Michael Zouberakis, C. Chandras, John M. Hancock, ...
111
Voted
CISS
2008
IEEE
15 years 7 months ago
Resource allocation for cooperative relaying
—The delay-limited capacity of the half-duplex relay channel is analyzed for several cooperative protocols under a long-term average total transmit power constraint. It is assume...
Jie Yang, Deniz Gündüz, D. Richard Brown...
« Prev « First page 1620 / 1838 Last » Next »