Sciweavers

2601 search results - page 107 / 521
» Secure Rewarding Schemes
Sort
View
ASIACRYPT
2006
Springer
15 years 5 months ago
Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys
We introduce a primitive called Hierarchical Identity-Coupling Broadcast Encryption (HICBE) that can be used for constructing efficient collusion-resistant public-key broadcast enc...
Nuttapong Attrapadung, Jun Furukawa, Hideki Imai
MOC
2010
14 years 9 months ago
Discontinuous Galerkin approximations of the Stokes and Navier-Stokes equations
Numerical schemes to compute approximate solutions of the evolutionary Stokes and Navier-Stokes equations are studied. The schemes are discontinuous in time and conforming in space...
Konstantinos Chrysafinos, Noel Walkington
ICTAI
1999
IEEE
15 years 7 months ago
Cognitive Packet Networks
Reliability, security, scalability and QoS (Quality-of-Service) have become key issues as we envision the future Internet. This paper presents the "Cognitive Packet Network (C...
Erol Gelenbe, Zhiguang Xu, Esin Seref
GLOBECOM
2010
IEEE
15 years 1 months ago
Credit-Based Mechanism Protecting Multi-Hop Wireless Networks from Rational and Irrational Packet Drop
The existing credit-based mechanisms mainly focus on stimulating the rational packet droppers to relay other nodes' packets, but they cannot identify the irrational packet dro...
Mohamed Elsalih Mahmoud, Xuemin Shen
CORR
2004
Springer
104views Education» more  CORR 2004»
15 years 2 months ago
Outflanking and securely using the PIN/TAN-System
The PIN/TAN
Alexander Wiesmaier, Marcus Fischer, Evangelos G. ...