Sciweavers

1865 search results - page 33 / 373
» Pan-Private Streaming Algorithms
Sort
View
ASIACRYPT
2006
Springer
15 years 7 months ago
On the (In)security of Stream Ciphers Based on Arrays and Modular Addition
Abstract. Stream ciphers play an important role in symmetric cryptology because of their suitability in high speed applications where block ciphers fall short. A large number of fa...
Souradyuti Paul, Bart Preneel
135
Voted
JSAC
2007
97views more  JSAC 2007»
15 years 3 months ago
R2: Random Push with Random Network Coding in Live Peer-to-Peer Streaming
— In information theory, it has been shown that network coding can effectively improve the throughput of multicast communication sessions in directed acyclic graphs. More practic...
Mea Wang, Baochun Li
NETWORKING
2000
15 years 5 months ago
Real-Time Traffic Transmission over the Internet
Abstract. Multimedia applications require the transmission of realtime streams over a network. These streams often exhibit variable bandwidth requirements, and require high bandwid...
Marco Furini, Donald F. Towsley
ASIACRYPT
1998
Springer
15 years 8 months ago
Analysis Methods for (Alleged) RC4
Abstract. The security of the alleged RC4 stream cipher and some variants is investigated. Cryptanalytic algorithms are developed for a known plaintext attack where only a small se...
Lars R. Knudsen, Willi Meier, Bart Preneel, Vincen...
ICDE
2003
IEEE
148views Database» more  ICDE 2003»
16 years 5 months ago
Dynamic Clustering of Evolving Streams with a Single Pass
Stream data is common in many applications, e.g., stock quotes, merchandize sales record, system logs, etc.. It is of great importance to analyze these stream data. As one of the ...
Jiong Yang