Sciweavers

1166 search results - page 132 / 234
» Adaptively Secure Broadcast
Sort
View
112
Voted
COMCOM
2006
148views more  COMCOM 2006»
15 years 24 days ago
An adaptive bluetooth packet selection and scheduling scheme in interference environments
Bluetooth is a new technology for Wireless Personal Area Networks (WPANs). It intends to eliminate the need of wires and connectors between a variety of devices, like PCs and thei...
Chen-Han Shih, Kuochen Wang, Hung-Cheng Shih
95
Voted
ACSAC
2005
IEEE
15 years 6 months ago
Privacy Requirements Implemented with a JavaCard
Privacy is extremely important in healthcare systems. Unfortunately, most of the solutions already deployed are developed empirically. After discussing some of such existing solut...
Anas Abou El Kalam, Yves Deswarte
123
Voted
CRYPTO
2005
Springer
135views Cryptology» more  CRYPTO 2005»
15 years 6 months ago
Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator
We present a constant-round protocol for general secure multiparty computation which makes a black-box use of a pseudorandom generator. In particular, the protocol does not requir...
Ivan Damgård, Yuval Ishai
DIAU
2000
Springer
15 years 5 months ago
Web MIXes: A System for Anonymous and Unobservable Internet Access
We present the architecture, design issues and functions of a MIX-based system for anonymous and unobservable real-time Internet access. This system prevents traffic analysis as ...
Oliver Berthold, Hannes Federrath, Stefan Köp...
88
Voted
AGENTS
1997
Springer
15 years 5 months ago
Linearly Anticipatory Autonomous Agents
Abstract. A special kind of anticipation is when an anticipated undesired situation makes an agent adapt its behavior in order to prevent that this situation will occur. In this ch...
Paul Davidsson