Sciweavers

537 search results - page 25 / 108
» Comparative Study of Protocols Used for Establishing VPN
Sort
View
LCN
2005
IEEE
15 years 3 months ago
Dynamic DiffServ Configuration Using COPS-PR
This paper presents a framework for managing dynamic Service Level Specification (SLS) in Differentiated Services (diffserv) networks. In the considered scenario, the configuratio...
André Beller, Edgard Jamhour, Manoel Camill...
FOCS
2005
IEEE
15 years 3 months ago
Cryptography In the Bounded Quantum-Storage Model
We initiate the study of two-party cryptographic primitives with unconditional security, assuming that the adversary’s quantum memory is of bounded size. We show that oblivious ...
Ivan Damgård, Serge Fehr, Louis Salvail, Chr...
SIAMCOMP
2008
154views more  SIAMCOMP 2008»
14 years 8 months ago
Cryptography in the Bounded-Quantum-Storage Model
We initiate the study of two-party cryptographic primitives with unconditional security, assuming that the adversary's quantum memory is of bounded size. We show that oblivio...
Ivan Damgård, Serge Fehr, Louis Salvail, Chr...
JEI
2006
128views more  JEI 2006»
14 years 9 months ago
Performance study of common image steganography and steganalysis techniques
Abstract. We investigate the performance of state of the art universal steganalyzers proposed in the literature. These universal steganalyzers are tested against a number of well-k...
Mehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon
SRDS
2000
IEEE
15 years 2 months ago
Performance of Mobile, Single-Object, Replication Protocols
This paper discusses the implementation and performance of bounded voting: a new object replication protocol designed for use in mobile and weakly-connected environments. We show ...
Ugur Çetintemel, Peter J. Keleher