Sciweavers

2237 search results - page 335 / 448
» On the Security of Random Sources
Sort
View
CORR
2008
Springer
141views Education» more  CORR 2008»
14 years 10 months ago
Truthful Unsplittable Flow for Large Capacity Networks
The unsplittable flow problem is one of the most extensively studied optimization problems in the field of networking. An instance of it consists of an edge capacitated graph and ...
Yossi Azar, Iftah Gamzu, Shai Gutner
PKC
1999
Springer
115views Cryptology» more  PKC 1999»
15 years 2 months ago
Decision Oracles are Equivalent to Matching Oracles
One of the key directions in complexity theory which has also filtered through to cryptographic research, is the effort to classify related but seemingly distinct notions. Separa...
Helena Handschuh, Yiannis Tsiounis, Moti Yung
EUROCRYPT
1990
Springer
15 years 2 months ago
Experimental Quantum Cryptography
We describe results from an apparatus and protocol designed to implement quantum key distribution, by which two users, who share no secret information initially: 1) exchange a ran...
Charles H. Bennett, François Bessette, Gill...
ASIACRYPT
2003
Springer
15 years 3 months ago
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking
We introduce a new cryptographic tool: multiset hash functions. Unlike standard hash functions which take strings as input, multiset hash functions operate on multisets (or sets). ...
Dwaine E. Clarke, Srinivas Devadas, Marten van Dij...
ICIP
2003
IEEE
15 years 11 months ago
A novel cost-distortion optimization framework for video streaming over differentiated services networks
This paperpresentsa novel framework for streamingvideo over a Differentiated Services (DifPjew) network that jointly considers video source coding. packet classification and error...
Fan Zhai, Yiftach Eisenberg, Carlos E. Luna, Thras...