Sciweavers

860 search results - page 64 / 172
» Biased Random Walks
Sort
View
94
Voted
CRYPTO
2010
Springer
145views Cryptology» more  CRYPTO 2010»
15 years 27 days ago
Protocols for Multiparty Coin Toss with Dishonest Majority
Coin-tossing protocols are protocols that generate a random bit with uniform distribution. These protocols are used as a building block in many cryptographic protocols. Cleve [STOC...
Amos Beimel, Eran Omri, Ilan Orlov
109
Voted
RSA
2002
99views more  RSA 2002»
15 years 10 days ago
Distributed algorithms with dynamical random transitions
Given any measure-preserving dynamical system (Y, A , , T) and g Lp() , we study convergence of the sequence 1 n n k=1 g TSk , n 1 where Sk is a dynamic Zr -valued random w...
Nadine Guillotin-Plantard, René Schott
135
Voted
PERCOM
2009
ACM
15 years 7 months ago
Randomizing RFID Private Authentication
—Privacy protection is increasingly important during authentications in Radio Frequency Identification (RFID) systems. In order to achieve high-speed authentication in largescale...
Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, ...
112
Voted
FOCS
2003
IEEE
15 years 6 months ago
On Certain Connectivity Properties of the Internet Topology
We show that random graphs in the preferential connectivity model have constant conductance, and hence have worst-case routing congestion that scales logarithmically with the numb...
Milena Mihail, Christos H. Papadimitriou, Amin Sab...
92
Voted
JCT
2007
108views more  JCT 2007»
15 years 17 days ago
The cover time of the preferential attachment graph
The preferential attachment graph Gm(n) is a random graph formed by adding a new vertex at each time step, with m edges which point to vertices selected at random with probability...
Colin Cooper, Alan M. Frieze