Sciweavers

111 search results - page 12 / 23
» Errors in Computational Complexity Proofs for Protocols
Sort
View
IM
2007
14 years 11 months ago
Robust Monitoring of Network-wide Aggregates through Gossiping
Abstract—We investigate the use of gossip protocols for continuous monitoring of network-wide aggregates under crash failures. Aggregates are computed from local management varia...
Fetahi Wuhib, Mads Dam, Rolf Stadler, Alexander Cl...
ICNP
1999
IEEE
15 years 2 months ago
Evaluating the Utility of FEC with Reliable Multicast
Forward Error Correction (FEC) has been proposed as a technique for implementing efficient reliable multicast (RM). However, FEC incurs costs in encode/decode delay and implementa...
Dan Li, David R. Cheriton
ACSC
2008
IEEE
15 years 4 months ago
Privacy preserving set intersection based on bilinear groups
We propose a more efficient privacy preserving set intersection protocol which improves the previously known result by a factor of O(N) in both the computation and communication c...
Yingpeng Sang, Hong Shen
SODA
2012
ACM
245views Algorithms» more  SODA 2012»
13 years 8 days ago
Lower bounds for number-in-hand multiparty communication complexity, made easy
In this paper we prove lower bounds on randomized multiparty communication complexity, both in the blackboard model (where each message is written on a blackboard for all players ...
Jeff M. Phillips, Elad Verbin, Qin Zhang
ASIACRYPT
2007
Springer
15 years 1 months ago
Simple and Efficient Perfectly-Secure Asynchronous MPC
Secure multi-party computation (MPC) allows a set of n players to securely compute an agreed function of their inputs, even when up to t players are under the control of an adversa...
Zuzana Beerliová-Trubíniová, ...