Sciweavers

422 search results - page 32 / 85
» Protocol Specialization
Sort
View
NETWORK
2008
94views more  NETWORK 2008»
15 years 1 months ago
Detecting compromised routers via packet forwarding behavior
While it is widely understood that criminal miscreants are subverting large numbers of Internet-connected computers (e.g., for bots, spyware, SPAM forwarding), it is less well app...
Alper Tugay Mizrak, Stefan Savage, Keith Marzullo
ICC
2009
IEEE
210views Communications» more  ICC 2009»
15 years 8 months ago
Multi-User Joint Subchannel and Power Resource-Allocation for Powerline Relay Networks
Abstract—This paper investigates Orthogonal FrequencyDivision Multiple-Access (OFDMA) resource-allocation schemes for two-hop relays in a home Powerline Communication (PLC) netwo...
Hao Zou, Aakanksha Chowdhery, Sumanth Jagannathan,...
IACR
2011
135views more  IACR 2011»
14 years 1 months ago
Charm: A framework for Rapidly Prototyping Cryptosystems
We describe Charm, an extensible framework designed for rapid prototyping of cryptographic systems that utilize the latest advances in cryptography, such as identity and attribute...
Joseph A. Akinyele, Matthew Green, Aviel D. Rubin
BIRTHDAY
2006
Springer
15 years 5 months ago
Optimal Flow Distribution Among Multiple Channels with Unknown Capacities
Consider a simple network flow problem in which there are n channels directed from a source to a sink. The channel capacities are unknown and we wish to determine a feasible netwo...
Richard M. Karp, Till Nierhoff, Till Tantau
137
Voted
STOC
2002
ACM
152views Algorithms» more  STOC 2002»
16 years 2 months ago
Universally composable two-party and multi-party secure computation
d Abstract) Ran Canetti Yehuda Lindell Rafail Ostrovsky Amit Sahai? We show how to securely realize any multi-party functionality in a universally composable way, regardless of th...
Ran Canetti, Yehuda Lindell, Rafail Ostrovsky, Ami...