Sciweavers

2601 search results - page 169 / 521
» Secure Rewarding Schemes
Sort
View
132
Voted
ASIACRYPT
2009
Springer
15 years 10 months ago
Improved Non-committing Encryption with Applications to Adaptively Secure Protocols
We present a new construction of non-committing encryption schemes. Unlike the previous constructions of Canetti et al. (STOC ’96) and of Damg˚ard and Nielsen (Crypto ’00), ou...
Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, H...
FC
2004
Springer
105views Cryptology» more  FC 2004»
15 years 8 months ago
Secure Generalized Vickrey Auction without Third-party Servers
This paper presents a secure Generalized Vickrey Auction (GVA) scheme that does not require third-party servers, i.e., the scheme is executed only by an auctioneer and bidders. Com...
Makoto Yokoo, Koutarou Suzuki
INFOCOM
2009
IEEE
15 years 10 months ago
Optimal Sensing-Transmission Structure for Dynamic Spectrum Access
—In cognitive wireless networks where secondary users (SUs) opportunistically access spectral white spaces of primary users (PUs), there exists an inherent tradeoff between sensi...
Senhua Huang, Xin Liu, Zhi Ding
HSNMC
2004
Springer
126views Multimedia» more  HSNMC 2004»
15 years 8 months ago
Hybrid Unicast and Multicast Flow Control: A Linear Optimization Approach
— In this paper, we present a solution to the general problem of flow control for both unicast and multicast IP networks. We formulate a convex optimization problem that can be ...
Homayoun Yousefi'zadeh, Fatemeh Fazel, Hamid Jafar...
POLICY
2004
Springer
15 years 8 months ago
A Policy Driven Approach to Email Services
The primary original design goal for email was to provide best-effort message delivery. Unfortunately, as the ever increasing uproar over SPAM demonstrates, the existing email inf...
Saket Kaushik, Paul Ammann, Duminda Wijesekera, Wi...