Sciweavers

2601 search results - page 425 / 521
» Secure Rewarding Schemes
Sort
View
ATAL
2009
Springer
15 years 9 months ago
Comparing trust mechanisms for monitoring aggregator nodes in sensor networks
Sensor nodes are often used to collect data from locations inaccessible or hazardous for humans. As they are not under normal supervision, these nodes are particularly susceptible...
Oly Mistry, Anil Gürsel, Sandip Sen
ASIACRYPT
2001
Springer
15 years 7 months ago
Fully Distributed Threshold RSA under Standard Assumptions
The aim of this article is to propose a fully distributed environment for the RSA scheme. What we have in mind is highly sensitive applications and even if we are ready to pay a pr...
Pierre-Alain Fouque, Jacques Stern
INFOCOM
2000
IEEE
15 years 7 months ago
Freeze-TCP: A True End-to-End TCP Enhancement Mechanism for Mobile Environments
Abstract— Optimizing TCP (Transport Layer) for mobility has been researched extensively. We present a brief summary of existing results which indicates that most schemes require ...
Tom Goff, James Moronski, Dhananjay S. Phatak, Vip...
JUCS
2008
113views more  JUCS 2008»
15 years 3 months ago
Enhancing ZRTP by using Computational Puzzles
Abstract: In this paper we present and discuss a new approach for securing multimedia communication, which is based on three innovations. The first innovation is the integration of...
Helmut Hlavacs, Wilfried N. Gansterer, Hannes Scha...
ASIACRYPT
2011
Springer
14 years 3 months ago
Functional Encryption for Inner Product Predicates from Learning with Errors
We propose a lattice-based functional encryption scheme for inner product predicates whose security follows from the difficulty of the learning with errors (LWE) problem. This co...
Shweta Agrawal, David Mandell Freeman, Vinod Vaiku...