Sciweavers

123 search results - page 16 / 25
» Selective Opening Security for Receivers
Sort
View
MOBIHOC
2009
ACM
15 years 11 months ago
Efficient uncoordinated FHSS anti-jamming communication
We address the problem of jamming-resistant communication in scenarios in which the communicating parties do not share secret keys. This includes scenarios where the communicating...
Mario Strasser, Christina Pöpper, Srdjan Capk...
CCS
2011
ACM
13 years 10 months ago
Practical PIR for electronic commerce
We extend Goldberg’s multi-server information-theoretic private information retrieval (PIR) with a suite of protocols for privacypreserving e-commerce. Our first protocol adds ...
Ryan Henry, Femi G. Olumofin, Ian Goldberg
EUROMICRO
2006
IEEE
15 years 4 months ago
BGP-like TE Capabilities for SHIM6
In this paper we present a comprehensive set of mechanisms that restore to the site administrator the capacity of enforcing Traffic Engineering (TE) policies in a multiaddressed I...
Marcelo Bagnulo, Alberto García-Martí...
FC
2004
Springer
75views Cryptology» more  FC 2004»
15 years 3 months ago
Peppercoin Micropayments
Abstract. We present the “Peppercoin” method for processing micropayments efficiently. With this method, a fraction of the micropayments received are determined, via a procedur...
Ronald L. Rivest
BIOSIG
2003
117views Biometrics» more  BIOSIG 2003»
14 years 11 months ago
Comparative Study on Fingerprint Recognition Systems - Project BioFinger
: This paper describes a comparative study on fingerprint recognition systems – the project BioFinger. The goal of this study is to investigate the capability characteristics of ...
Michael Arnold, Henning Daum, Christoph Busch