Sciweavers

338 search results - page 53 / 68
» A New Key Distribution Scheme for Secure Multicast Communica...
Sort
View
ICC
2009
IEEE
145views Communications» more  ICC 2009»
14 years 7 months ago
Distributed and Power Efficient Routing in Wireless Cooperative Networks
Most ad hoc mobile devices in wireless networks operate on batteries and power consumption is therefore an important issue for wireless network design. In this paper, we propose an...
Zhengguo Sheng, Zhiguo Ding, Kin K. Leung
WWW
2010
ACM
15 years 4 months ago
Distributing private data in challenged network environments
Developing countries face significant challenges in network access, making even simple network tasks unpleasant. Many standard techniques—caching and predictive prefetching— ...
Azarias Reda, Brian D. Noble, Yidnekachew Haile
ASIACRYPT
2003
Springer
15 years 2 months ago
A Traceable Block Cipher
In this paper1 we propose a new symmetric block cipher with the following paradoxical traceability properties: it is computationally easy to derive many equivalent secret keys prov...
Olivier Billet, Henri Gilbert
FCS
2006
14 years 11 months ago
Quantum Oblivious Transfer Based on POVM Measurements
- Oblivious transfer OT is an important primitive in cryptography. In chosen one-out-of-two OT, Alice offers two bits, one of which Bob can choose to read, not learning any informa...
Wei Yang, Liusheng Huang, Yonglong Luo, Mingjun Xi...
IEEEPACT
2002
IEEE
15 years 2 months ago
Efficient Interconnects for Clustered Microarchitectures
Clustering is an effective microarchitectural technique for reducing the impact of wire delays, the complexity, and the power requirements of microprocessors. In this work, we inv...
Joan-Manuel Parcerisa, Julio Sahuquillo, Antonio G...