Sciweavers

1030 search results - page 43 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
ICNP
1998
IEEE
15 years 1 months ago
Applying MSTDM to Packet Voice and Data in Cellular Radio Systems
MSTDM is a variant of the Ethernet protocol that provides quality of service guarantees for voice. This protocol has been applied to LAN's and CATV networks. Cellular network...
Nicholas F. Maxemchuk
EDBT
2009
ACM
195views Database» more  EDBT 2009»
15 years 4 months ago
Anonymizing moving objects: how to hide a MOB in a crowd?
Moving object databases (MOD) have gained much interest in recent years due to the advances in mobile communications and positioning technologies. Study of MOD can reveal useful i...
Roman Yarovoy, Francesco Bonchi, Laks V. S. Lakshm...
88
Voted
IPL
2006
141views more  IPL 2006»
14 years 9 months ago
Perfectly Reliable Message Transmission
We study the problem of Perfectly Reliable Message Transmission (PRMT) and Perfectly Secure Message Transmission (PSMT) between two nodes S and R in an undirected synchronous netw...
Arvind Narayanan, K. Srinathan, C. Pandu Rangan
TPDS
2008
116views more  TPDS 2008»
14 years 9 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
STOC
1999
ACM
122views Algorithms» more  STOC 1999»
15 years 2 months ago
Oblivious Transfer and Polynomial Evaluation
Oblivious polynomial evaluation is a protocol involving two parties, a sender whose input is a polynomial P, and a receiver whose input is a value α. At the end of the protocol t...
Moni Naor, Benny Pinkas