Sciweavers

3130 search results - page 13 / 626
» Collusion without communication
Sort
View
CRYPTO
1999
Springer
152views Cryptology» more  CRYPTO 1999»
15 years 4 months ago
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes
Several variations of rooted tree based solutions have been recently proposed for member revocation in multicast communications [18, 19, 20, 21]. In this paper, we show that by ass...
Radha Poovendran, John S. Baras
ICICS
2007
Springer
15 years 6 months ago
Short Group Signature Without Random Oracles
Xiaohui Liang, Zhenfu Cao, Jun Shao, Huang Lin
KDD
2010
ACM
203views Data Mining» more  KDD 2010»
15 years 3 months ago
Collusion-resistant privacy-preserving data mining
Recent research in privacy-preserving data mining (PPDM) has become increasingly popular due to the wide application of data mining and the increased concern regarding the protect...
Bin Yang, Hiroshi Nakagawa, Issei Sato, Jun Sakuma
VTC
2010
IEEE
121views Communications» more  VTC 2010»
14 years 10 months ago
MYRPA: An Incentive System with Reduced Payment Receipts for Multi-hop Wireless Networks
Abstract— In this paper, we propose an incentive system to stimulate the nodes’ cooperation in multi-hop wireless networks. Reducing the number and the size of the payment rece...
Mohamed Elsalih Mahmoud, Xuemin Shen
INFOCOM
2012
IEEE
13 years 2 months ago
On detecting pollution attacks in inter-session network coding
Abstract—Dealing with pollution attacks in inter-session network coding is challenging due to the fact that sources, in addition to intermediate nodes, can be malicious. In this ...
Anh Le, Athina Markopoulou