Sciweavers

1166 search results - page 30 / 234
» Adaptively Secure Broadcast
Sort
View
107
Voted
CORR
2008
Springer
73views Education» more  CORR 2008»
15 years 16 days ago
Secrecy Capacity of a Class of Broadcast Channels with an Eavesdropper
We study the security of communication between a single transmitter and multiple receivers in a broadcast channel in the presence of an eavesdropper. Characterizing the secrecy ca...
Ersen Ekrem, Sennur Ulukus
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
14 years 10 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
82
Voted
ICASSP
2008
IEEE
15 years 7 months ago
An unsupervised web-based topic language model adaptation method
This paper focuses on a solution to better adapt ASR systems, whose language models (LM) are usually trained on topic-independent corpora, to new topics, in particular in the case...
Gwénolé Lecorvé, Guillaume Gr...
123
Voted
EUROCRYPT
2009
Springer
16 years 1 months ago
A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
Recently, at Crypto 2008, Boneh, Halevi, Hamburg, and Ostrovsky (BHHO) solved the longstanding open problem of "circular encryption," by presenting a public key encrypti...
Jan Camenisch, Nishanth Chandran, Victor Shoup
97
Voted
ICMCS
2005
IEEE
127views Multimedia» more  ICMCS 2005»
15 years 6 months ago
Asynchronous Media Streaming Over Wireless Broadcast Channels
We consider wireless broadcasting of multimedia content to allow asynchronous media access. Receivers subscribe at any time to the ongoing broadcast session, but are still able to...
Hrvoje Jenkac, Thomas Stockhammer