Sciweavers

2478 search results - page 337 / 496
» Message from the Chair
Sort
View
CCS
2008
ACM
15 years 2 months ago
Multi-use unidirectional proxy re-signatures
In 1998, Blaze, Bleumer, and Strauss suggested a cryptographic primitive termed proxy re-signature in which a proxy transforms a signature computed under Alice's secret key in...
Benoît Libert, Damien Vergnaud
EDBT
2008
ACM
161views Database» more  EDBT 2008»
15 years 2 months ago
Automatic content targeting on mobile phones
The mobile phone industry has reached a saturation point. With low growth rates and fewer new customers available to acquire, competition among mobile operators is now focused on ...
Giovanni Giuffrida, Catarina Sismeiro, Giuseppe Tr...
APPROX
2010
Springer
179views Algorithms» more  APPROX 2010»
15 years 2 months ago
Rumor Spreading on Random Regular Graphs and Expanders
Broadcasting algorithms are important building blocks of distributed systems. In this work we investigate the typical performance of the classical and well-studied push model. Assu...
Nikolaos Fountoulakis, Konstantinos Panagiotou
108
Voted
DAGSTUHL
1994
15 years 2 months ago
A High Performance Totally Ordered Multicast Protocol
This paper presents the Reliable Multicast Protocol (RMP). RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service su...
Brian Whetten, Todd Montgomery, Simon M. Kaplan
115
Voted
CRYPTO
2010
Springer
208views Cryptology» more  CRYPTO 2010»
15 years 1 months ago
Improved Delegation of Computation Using Fully Homomorphic Encryption
Following Gennaro, Gentry, and Parno (Cryptology ePrint Archive 2009/547), we use fully homomorphic encryption to design improved schemes for delegating computation. In such schem...
Kai-Min Chung, Yael Kalai, Salil P. Vadhan