We address the problem of jamming-resistant communication in scenarios in which the communicating parties do not share secret keys. This includes scenarios where the communicating...
We extend Goldberg’s multi-server information-theoretic private information retrieval (PIR) with a suite of protocols for privacypreserving e-commerce. Our first protocol adds ...
In this paper we present a comprehensive set of mechanisms that restore to the site administrator the capacity of enforcing Traffic Engineering (TE) policies in a multiaddressed I...
Abstract. We present the “Peppercoin” method for processing micropayments efficiently. With this method, a fraction of the micropayments received are determined, via a procedur...
: This paper describes a comparative study on fingerprint recognition systems – the project BioFinger. The goal of this study is to investigate the capability characteristics of ...