Sciweavers

828 search results - page 84 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
MM
2004
ACM
109views Multimedia» more  MM 2004»
15 years 8 months ago
Loss-resilient on-demand media streaming using priority encoding
A novel solution to the reliable multicast problem is the “digital fountain” approach, in which data is encoded with an erasure protection code before transmission, and receiv...
Cheng Huang, Ramaprabhu Janakiraman, Lihao Xu
TON
2012
13 years 5 months ago
A New Cell-Counting-Based Attack Against Tor
Abstract—Various low-latency anonymous communication systems such as Tor and Anonymizer have been designed to provide anonymity service for users. In order to hide the communicat...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xu...
145
Voted
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
13 years 5 months ago
Better Bootstrapping in Fully Homomorphic Encryption
Gentry’s bootstrapping technique is currently the only known method of obtaining a “pure” fully homomorphic encryption (FHE) schemes, and it may offers performance advantage...
Craig Gentry, Shai Halevi, Nigel P. Smart
MASS
2010
160views Communications» more  MASS 2010»
15 years 1 months ago
Dynamic operator replacement in sensor networks
We present an integrated approach for supporting in-network sensor data processing in dynamic and heterogeneous sensor networks. The concept relies on data stream processing techni...
Moritz Striibe, Michael Daum, Rüdiger Kapitza...
INFSOF
1998
88views more  INFSOF 1998»
15 years 2 months ago
A logic based language for networked agents
This paper presents a logic based language, SAFIN, for developing networked software agents. It integrates agent-oriented programming, KQML and basic mobile techniques to support ...
Dianxiang Xu