Sciweavers

3504 search results - page 520 / 701
» Secure protocol composition
Sort
View
124
Voted
PDPTA
2008
15 years 3 months ago
Intrusion-Tolerant Dissemination in Large-Scale Systems
Abstract - With the growth of the Internet and increased demand for Web Services has come a heightened need for scalable wide-area group communication systems. The need for trust i...
Kim Potter Kihlstrom, Robin Elliott, Kelsey Marshm...
CRYPTO
2010
Springer
158views Cryptology» more  CRYPTO 2010»
15 years 2 months ago
Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography
Motivated by the question of basing cryptographic protocols on stateless tamper-proof hardware tokens, we revisit the question of unconditional two-prover zero-knowledge proofs fo...
Vipul Goyal, Yuval Ishai, Mohammad Mahmoody, Amit ...
IPL
2008
72views more  IPL 2008»
15 years 1 months ago
Reducing communication costs in robust peer-to-peer networks
Several recent research results describe how to design Distributed Hash Tables (DHTs) that are robust to adversarial attack via Byzantine faults. Unfortunately, all of these resul...
Jared Saia, Maxwell Young
CISS
2010
IEEE
14 years 5 months ago
Retrodirective distributed transmit beamforming with two-way source synchronization
—Distributed transmit beamforming has recently been proposed as a technique in which several single-antenna sources cooperate to form a virtual antenna array and simultaneously t...
Robert D. Preuss, D. Richard Brown
INFOCOM
2012
IEEE
13 years 4 months ago
Fine-grained private matching for proximity-based mobile social networking
—Proximity-based mobile social networking (PMSN) refers to the social interaction among physically proximate mobile users directly through the Bluetooth/WiFi interfaces on their ...
Rui Zhang 0007, Yanchao Zhang, Jinyuan Sun, Guanhu...