Sciweavers

849 search results - page 147 / 170
» Completely Non-malleable Schemes
Sort
View
223
Voted
ICDE
2008
IEEE
190views Database» more  ICDE 2008»
16 years 1 months ago
Adaptive Segmentation for Scientific Databases
In this paper we explore database segmentation in the context of a column-store DBMS targeted at a scientific database. We present a novel hardware- and scheme-oblivious segmentati...
Milena Ivanova, Martin L. Kersten, Niels Nes
117
Voted
TCC
2009
Springer
167views Cryptology» more  TCC 2009»
16 years 1 months ago
Simultaneous Hardcore Bits and Cryptography against Memory Attacks
This paper considers two questions in cryptography. Cryptography Secure Against Memory Attacks. A particularly devastating side-channel attack against cryptosystems, termed the &qu...
Adi Akavia, Shafi Goldwasser, Vinod Vaikuntanathan
97
Voted
TCC
2009
Springer
158views Cryptology» more  TCC 2009»
16 years 1 months ago
On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols
The concept of witness-hiding suggested by Feige and Shamir is a natural relaxation of zero-knowledge. In this paper we identify languages and distributions for which many known co...
Iftach Haitner, Alon Rosen, Ronen Shaltiel
91
Voted
GLOBECOM
2009
IEEE
15 years 7 months ago
Random Linear Network Coding for Time-Division Duplexing: Field Size Considerations
Abstract— We study the effect of the field size on the performance of random linear network coding for time division duplexing channels proposed in [1]. In particular, we study ...
Daniel Enrique Lucani, Muriel Médard, Milic...
MOBILITY
2009
ACM
15 years 7 months ago
UbiPay: minimizing transaction costs with smart mobile payments
Implementing an electronic payment system involves striking a balance between usability and security. Systems that allow payments to be completed with little effort on the part of...
Vili Lehdonvirta, Hayuru Soma, Hitoshi Ito, Tetsuo...