Sciweavers

828 search results - page 66 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
EUROCRYPT
2006
Springer
15 years 6 months ago
Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures
Abstract. Lattice-based signature schemes following the GoldreichGoldwasser-Halevi (GGH) design have the unusual property that each signature leaks information on the signer's...
Phong Q. Nguyen, Oded Regev
P2P
2006
IEEE
101views Communications» more  P2P 2006»
15 years 9 months ago
Towards Scalable Mobility in Distributed Hash Tables
For the use in the Internet domain, distributed hash tables (DHTs) have proven to be an efficient and scalable approach to distributed content storage and access. In this paper, ...
Olaf Landsiedel, Stefan Götz, Klaus Wehrle
INFOCOM
2012
IEEE
13 years 5 months ago
RISA: Distributed Road Information Sharing Architecture
—With the advent of the new IEEE 802.11p DSRC/WAVE radios, Vehicle-to-Vehicle (V2V) communications is poised for a dramatic leap. A canonical application for these future vehicul...
Joon Ahn, Yi Wang, Bo Yu, Fan Bai, Bhaskar Krishna...
PASTE
2005
ACM
15 years 8 months ago
Automatically generating refactorings to support API evolution
When library APIs change, client code should change in response, in order to avoid erroneous behavior, compilation failures, or warnings. Previous research has introduced techniqu...
Jeff H. Perkins
MMS
2000
15 years 2 months ago
Video Placement and Configuration of Distributed Video Servers on Cable TV Networks
A large-scale, distributed video-on-demand (VOD) system allows geographically dispersed residential and business users to access video services, such as movies and other multimedia...
Constantinos Vassilakis, Michael Paterakis, Peter ...