Sciweavers

1748 search results - page 214 / 350
» Security Models for Heterogeneous Networking
Sort
View
IACR
2011
124views more  IACR 2011»
14 years 3 months ago
Generic Fully Simulatable Adaptive Oblivious Transfer
We aim at constructing adaptive oblivious transfer protocols, enjoying fully simulatable security, from various well-known assumptions such as DDH, d-Linear, QR, DCR, and LWE. To t...
Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
P2PKM
2004
15 years 5 months ago
A Space-Efficient Model for Sharing Personal Knowledge Objects in Peer Communities
Abstract. In the future it is likely that peer communities will be routinely established for the purpose of sharing electronic resources and targeted information among groups of pe...
Fred S. Annexstein, Kenneth A. Berman
ICIC
2009
Springer
15 years 1 months ago
An Intelligent Prediction Model for Generating LGD Trigger of IEEE 802.21 MIH
IEEE recently standardized 802.21-2008 Media Independent Handover (MIH) standard. MIH is a key milestone toward the evolution of integrated heterogeneous 4G wireless networks. MIH ...
Muhammad Yousaf, Sohail Bhatti, Maaz Rehan, Amir Q...
ICDE
2005
IEEE
110views Database» more  ICDE 2005»
15 years 9 months ago
Locality Aware Networked Join Evaluation
We pose the question: how do we efficiently evaluate a join operator, distributed over a heterogeneous network? Our objective here is to optimize the delay of output tuples. We di...
Yanif Ahmad, Ugur Çetintemel, John Jannotti...
CORR
2010
Springer
169views Education» more  CORR 2010»
15 years 3 months ago
Spiking Neurons with ASNN Based-Methods for the Neural Block Cipher
Problem statement: This paper examines Artificial Spiking Neural Network (ASNN) which inter-connects group of artificial neurons that uses a mathematical model with the aid of blo...
Saleh Ali K. Al-Omari, Putra Sumari