Sciweavers

1166 search results - page 104 / 234
» Adaptively Secure Broadcast
Sort
View
114
Voted
ICASSP
2011
IEEE
14 years 4 months ago
Joint source-channel-network coding for bidirectional wireless relays
The application of joint source-channel coding, based on fountain codes, in the broadcast timeslot of wireless two-way network coding is investigated in this paper. A computationa...
Francois P. S. Luus, Bodhaswar T. Maharaj
ISORC
2008
IEEE
15 years 7 months ago
QoS Aware Dependable Distributed Stream Processing
In this paper we describe our approach for developing a QoS-aware, dependable execution environment for large-scale distributed stream processing applications. Distributed stream ...
Vana Kalogeraki, Dimitrios Gunopulos, Ravi S. Sand...
110
Voted
CCS
2005
ACM
15 years 6 months ago
Direct chosen ciphertext security from identity-based techniques
We describe a new encryption technique that is secure in the standard model against adaptive chosen ciphertext (CCA2) attacks. We base our method on two very efficient Identity-Ba...
Xavier Boyen, Qixiang Mei, Brent Waters
134
Voted
PERCOM
2005
ACM
16 years 8 days ago
Security Parallels between People and Pervasive Devices
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
Stephen A. Weis
97
Voted
TCC
2007
Springer
102views Cryptology» more  TCC 2007»
15 years 6 months ago
Universally Composable Security with Global Setup
Abstract. Cryptographic protocols are often designed and analyzed under some trusted set-up assumptions, namely in settings where the participants have access to global information...
Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi W...