Sciweavers

314 search results - page 3 / 63
» Secure Network Coding on a Wiretap Network
Sort
View
99
Voted
EUROCRYPT
2008
Springer
15 years 1 months ago
Almost-Everywhere Secure Computation
Secure multi-party computation (MPC) is a central problem in cryptography. Unfortunately, it is well known that MPC is possible if and only if the underlying communication network...
Juan A. Garay, Rafail Ostrovsky
FTNET
2007
80views more  FTNET 2007»
14 years 11 months ago
Network Coding Applications
Network coding is an elegant and novel technique introduced at the turn of the millennium to improve network throughput and performance. It is expected to be a critical technology...
Christina Fragouli, Emina Soljanin
CCS
2009
ACM
16 years 5 days ago
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers
The man-in-the-middle (MITM) attack has been shown to be one of the most serious threats to the security and trust of existing VoIP protocols and systems. For example, the MITM wh...
Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui ...
72
Voted
AINA
2005
IEEE
15 years 5 months ago
Automatic Generation of the C# Code for Security Protocols Verified with Casper/FDR
Chul-Wuk Jeon, Il-Gon Kim, Jin-Young Choi
INFOCOM
2006
IEEE
15 years 5 months ago
Cooperative Security for Network Coding File Distribution
Abstract— Peer-to-peer content distribution networks can suffer from malicious participants that corrupt content. Current systems verify blocks with traditional cryptographic sig...
Christos Gkantsidis, Pablo Rodriguez