Sciweavers

1166 search results - page 21 / 234
» Adaptively Secure Broadcast
Sort
View
FOCS
2007
IEEE
15 years 6 months ago
Round Complexity of Authenticated Broadcast with a Dishonest Majority
Broadcast among n parties in the presence of t ≥ n/3 malicious parties is possible only with some additional setup. The most common setup considered is the existence of a PKI an...
Juan A. Garay, Jonathan Katz, Chiu-Yuen Koo, Rafai...
101
Voted
ENGL
2007
78views more  ENGL 2007»
15 years 11 days ago
A Method for Secure Query Processing in Mobile Databases
—A method for secure query processing in mobile databases has been presented in this paper. Mobile devices send queries to the server via point-to-point channels. The mobile data...
D. Saha, N. Chowdhury
76
Voted
AGENTS
1999
Springer
15 years 4 months ago
An Adaptive Interactive Agent for Route Advice
Seth Rogers, Claude-Nicolas Fiechter, Pat Langley
75
Voted
ACISP
2010
Springer
15 years 2 months ago
Adaptive and Composable Non-committing Encryptions
Huafei Zhu, Tadashi Araragi, Takashi Nishide, Koui...
102
Voted
JSW
2008
101views more  JSW 2008»
15 years 11 days ago
Broadcast Authentication with Practically Unbounded One-way Chains
A protocol for assuring the authenticity of information broadcasted over long periods of time is proposed. The protocol is based on time synchronization and uses one-way chains con...
Bogdan Groza