Sciweavers

1166 search results - page 63 / 234
» Adaptively Secure Broadcast
Sort
View
92
Voted
WDAG
2010
Springer
184views Algorithms» more  WDAG 2010»
14 years 11 months ago
Fast Asynchronous Consensus with Optimal Resilience
Abstract. We give randomized agreement algorithms with constant expected running time in asynchronous systems subject to process failures, where up to a minority of processes may f...
Ittai Abraham, Marcos Kawazoe Aguilera, Dahlia Mal...
121
Voted
ICSOC
2009
Springer
14 years 10 months ago
A Genetic Algorithms-Based Approach for Optimized Self-protection in a Pervasive Service Middleware
With increasingly complex and heterogeneous systems in pervasive service computing, it becomes more and more important to provide self-protected services to end users. In order to ...
Weishan Zhang, Julian Schütte, Mads Ingstrup,...
TPDS
2008
262views more  TPDS 2008»
15 years 13 days ago
Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries
Content services such as content filtering and transcoding adapt contents to meet system requirements, display capacities, or user preferences. Data security in such a framework is...
Yunhua Koglin, Danfeng Yao, Elisa Bertino
138
Voted
JOC
2007
129views more  JOC 2007»
15 years 13 days ago
Formal Proofs for the Security of Signcryption
Signcryption is a public key or asymmetric cryptographic method that provides simultaneously both message confidentiality and unforgeability at a lower computational and communica...
Joonsang Baek, Ron Steinfeld, Yuliang Zheng
110
Voted
ACNS
2006
Springer
96views Cryptology» more  ACNS 2006»
15 years 2 months ago
On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries
In this paper, we model the adversary (eavesdropper) present in the wireless communication medium using probabilistic models. We precisely formulate the security-throughput optimiz...
Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarat...