Sciweavers

7943 search results - page 118 / 1589
» A calculus for costed computations
Sort
View
CIC
2006
114views Communications» more  CIC 2006»
15 years 3 days ago
Tree Based Conference Key Establishment Cost Analysis and Minimization in Heterogeneous Networks
A shared secret, conference key, must be established among members to securely communicate among them. The Diffie-Hellman is often used for the conference key establishment. In a ...
Zhan Liu, Mi Lu
ICSAP
2010
14 years 8 months ago
Enhanced Cost Effective Symmetric Key Algorithm for Small Amount of Data
Security being the major concern during data transfers, we have various challenges to face. The requirements of the security model vary depending on the type of data to be encrypte...
R. Satheesh Kumar, E. Pradeep, K. Naveen, R. Gunas...
IJISEC
2010
114views more  IJISEC 2010»
14 years 8 months ago
A new hardware-assisted PIR with O(n) shuffle cost
Abstract Since the concept of private information retrieval (PIR) was first formalized by Chor et. al, various constructions have been proposed with a common goal of reducing commu...
Xuhua Ding, Yanjiang Yang, Robert H. Deng, Shuhong...
MFCS
2009
Springer
15 years 5 months ago
The Cost of Stability in Network Flow Games
The core of a cooperative game contains all stable distributions of a coalition’s gains among its members. However, some games have an empty core, with every distribution being ...
Ezra Resnick, Yoram Bachrach, Reshef Meir, Jeffrey...
IEEESCC
2005
IEEE
15 years 4 months ago
Online and Minimum-Cost Ad Hoc Delegation in e-Service Composition
The paradigm of automated e-service composition through the integration of existing services promises a fast and efficient development of new services in cooperative business env...
Cagdas Evren Gerede, Oscar H. Ibarra, Bala Ravikum...