Sciweavers

77 search results - page 12 / 16
» How to Achieve a McEliece-Based Digital Signature Scheme
Sort
View
MOBIQUITOUS
2005
IEEE
15 years 3 months ago
Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, cache consistency issues must be addressed. T...
Wensheng Zhang, Guohong Cao
DAC
2002
ACM
15 years 10 months ago
Watermarking integer linear programming solutions
Linear programming (LP) in its many forms has proven to be an indispensable tool for expressing and solving optimization problems in numerous domains. We propose the first set of ...
Seapahn Megerian, Milenko Drinic, Miodrag Potkonja...
ICCSA
2004
Springer
15 years 2 months ago
GTVIS: Fast and Efficient Rendering System for Real-Time Terrain Visualization
The paper presents an improved scheme for the visualization of 3D terrain in real-time using Digital Elevation Model (DEM). The method is primarily based on a modified version of R...
Russel A. Apu, Marina L. Gavrilova
FOCS
2007
IEEE
15 years 3 months ago
Round Complexity of Authenticated Broadcast with a Dishonest Majority
Broadcast among n parties in the presence of t ≥ n/3 malicious parties is possible only with some additional setup. The most common setup considered is the existence of a PKI an...
Juan A. Garay, Jonathan Katz, Chiu-Yuen Koo, Rafai...
SPW
2004
Springer
15 years 2 months ago
The Dancing Bear: A New Way of Composing Ciphers
This note presents a new way of composing cryptographic primitives which makes some novel combinations possible. For example, one can do threshold decryption using standard block c...
Ross Anderson