Sciweavers

86 search results - page 12 / 18
» Impossibility Results for Secret Establishment
Sort
View
81
Voted
FOCS
2009
IEEE
15 years 6 months ago
Bit Encryption Is Complete
Abstract— Under CPA and CCA1 attacks, a secure bit encryption scheme can be applied bit-by-bit to construct a secure many-bit encryption scheme. The same construction fails, howe...
Steven Myers, Abhi Shelat
72
Voted
NOMS
2008
IEEE
15 years 5 months ago
Monitoring scheduling for home gateways
— In simple and monolithic systems such as our current home gateways, monitoring is often overlooked: the home user can only reboot the gateway when there is a problem. In next-g...
Stéphane Frénot, Yvan Royon, Pierre ...
93
Voted
CIA
2006
Springer
15 years 3 months ago
The Distortion of Cardinal Preferences in Voting
The theoretical guarantees provided by voting have distinguished it as a prominent method of preference aggregation among autonomous agents. However, unlike humans, agents usually ...
Ariel D. Procaccia, Jeffrey S. Rosenschein
87
Voted
ICMCS
2010
IEEE
210views Multimedia» more  ICMCS 2010»
15 years 15 days ago
Confidence evaluation for robust, fast-converging disparity map refinement
To improve upon the initial disparity estimates stemming from a local correspondence method, a subsequent refinement step is commonly employed. The performance of the stereo match...
Jorn Jachalsky, Markus Schlosser, Dirk Gandolph
ICDCS
2011
IEEE
13 years 11 months ago
JR-SND: Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks
Abstract—Secure neighbor discovery is fundamental to mobile ad hoc networks (MANETs) deployed in hostile environments and refers to the process in which two neighboring nodes exc...
Rui Zhang 0007, Yanchao Zhang, Xiaoxia Huang