Sciweavers

2472 search results - page 77 / 495
» Parallel Key Exchange
Sort
View
FOCS
2010
IEEE
14 years 10 months ago
On the Insecurity of Parallel Repetition for Leakage Resilience
A fundamental question in leakage-resilient cryptography is: can leakage resilience always be amplified by parallel repetition? It is natural to expect that if we have a leakage-r...
Allison B. Lewko, Brent Waters
105
Voted
SIGMOD
2004
ACM
151views Database» more  SIGMOD 2004»
16 years 28 days ago
Highly-Available, Fault-Tolerant, Parallel Dataflows
We present a technique that masks failures in a cluster to provide high availability and fault-tolerance for long-running, parallelized dataflows. We can use these dataflows to im...
Mehul A. Shah, Joseph M. Hellerstein, Eric A. Brew...
IPPS
2008
IEEE
15 years 7 months ago
Parallel IP lookup using multiple SRAM-based pipelines
Pipelined SRAM-based algorithmic solutions have become competitive alternatives to TCAMs (ternary content addressable memories) for high throughput IP lookup. Multiple pipelines c...
Weirong Jiang, Viktor K. Prasanna
EUROMICRO
2003
IEEE
15 years 6 months ago
Towards A Classification Model for Component-Based Software Engineering Research
Accurate and timely information is a key motivator in the widespread adoption of CBSE technology in Europe. Although there are overlaps and informal communications between researc...
Gerald Kotonya, Ian Sommerville, Steve Hall
MFCS
1990
Springer
15 years 4 months ago
One-Way Functions in Complexity Theory
We introduce the notion of associative one-way functions and prove that they exist if and only if P 6= NP. As evidence of their utility, we present two novel protocols that apply ...
Alan L. Selman