Sciweavers

4761 search results - page 624 / 953
» Performance of Protocols
Sort
View
CRYPTO
2012
Springer
277views Cryptology» more  CRYPTO 2012»
13 years 7 months ago
Multiparty Computation from Somewhat Homomorphic Encryption
We propose a general multiparty computation protocol secure against an active adversary corrupting up to n−1 of the n players. The protocol may be used to compute securely arithm...
Ivan Damgård, Valerio Pastro, Nigel P. Smart...
ACISICIS
2009
IEEE
15 years 11 months ago
BackupIT: An Intrusion-Tolerant Cooperative Backup System
Reliable storage of large amounts of data is always a delicate issue. Availability, efficiency, data integrity, and confidentiality are some features a data backup system should...
Sérgio Raymundo Loest, Marcelo Cheminn Madr...
MHCI
2007
Springer
15 years 11 months ago
Incidental information and mobile search
There is much interest in providing effective mobile search tools. Our focus is the value of in situ sharing of users’ mobile search activity. The QnotA prototype displays other...
David Arter, George Buchanan, Matt Jones, Richard ...
130
Voted
CASCON
1996
113views Education» more  CASCON 1996»
15 years 6 months ago
Network management views using delegated agents
The lack of an appropriate external data model is one of the reasons for the dearth of eective network management applications. Many network management computations over Managemen...
Germán S. Goldszmidt
121
Voted
CONEXT
2009
ACM
15 years 6 months ago
FairTorrent: bringing fairness to peer-to-peer systems
Peer-to-Peer file-sharing applications suffer from a fundamental problem of unfairness. Free-riders cause slower download times for others by contributing little or no upload band...
Alex Sherman, Jason Nieh, Clifford Stein