Sciweavers

2015 search results - page 331 / 403
» Some Observations on Indifferentiability
Sort
View
INFOCOM
2003
IEEE
15 years 10 months ago
Performance anomaly of 802.11b
— We analyze the performance of the IEEE 802.11b wireless local area networks. We have observed that when some mobile hosts use a lower bit rate than the others, the performance ...
Gilles Berger-Sabbatel, Franck Rousseau, Martin He...
129
Voted
CCS
2003
ACM
15 years 10 months ago
Cryptographic tamper evidence
We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div...
Gene Itkis
COMPSAC
2002
IEEE
15 years 10 months ago
Dependency Analysis and Visualization as Tools to Prolong System Life
This paper describes our experience using dependency analysis and visualization as a tool to identify intervention points for migrating applications to environments where they can...
Dave McComb, Simon Robe, Simon Hoare, Stew Crawfor...
EUROCRYPT
2001
Springer
15 years 9 months ago
On Perfect and Adaptive Security in Exposure-Resilient Cryptography
Abstract. We consider the question of adaptive security for two related cryptographic primitives: all-or-nothing transforms and exposureresilient functions. Both are concerned with...
Yevgeniy Dodis, Amit Sahai, Adam Smith
EMMCVPR
1999
Springer
15 years 9 months ago
A New Algorithm for Energy Minimization with Discontinuities
Many tasks in computer vision involve assigning a label (such as disparity) to every pixel. These tasks can be formulated as energy minimization problems. In this paper, we conside...
Yuri Boykov, Olga Veksler, Ramin Zabih