Sciweavers

1462 search results - page 107 / 293
» The Abstract MAC Layer
Sort
View
144
Voted
CRYPTO
2001
Springer
97views Cryptology» more  CRYPTO 2001»
15 years 9 months ago
Two-Party Generation of DSA Signatures
d Abstract) Philip MacKenzie and Michael K. Reiter Bell Labs, Lucent Technologies, Murray Hill, NJ, USA We describe a means of sharing the DSA signature function, so that two parti...
Philip D. MacKenzie, Michael K. Reiter
185
Voted
CTRSA
2010
Springer
257views Cryptology» more  CTRSA 2010»
15 years 12 months ago
Practical Key Recovery Attack against Secret-IV Edon-
Abstract. The SHA-3 competition has been organized by NIST to select a new hashing standard. Edon-R was one of the fastest candidates in the first round of the competition. In thi...
Gaëtan Leurent
139
Voted
GLOBECOM
2006
IEEE
15 years 11 months ago
Optimal Resource Allocation via Geometric Programming for OFDM Broadcast and Multiple Access Channels
Abstract— For multi-user orthogonal frequency division multiplexing (OFDM) systems, efficient optimal rate and power allocation algorithms are presented via geometric programmin...
Kibeom Seong, David D. Yu, Youngjae Kim, John M. C...
INFOCOM
2010
IEEE
15 years 3 months ago
RIPPLE Authentication for Network Coding
Abstract—By allowing routers to randomly mix the information content in packets before forwarding them, network coding can maximize network throughput in a distributed manner wit...
Yaping Li, Hongyi Yao, Minghua Chen, Sidharth Jagg...
EDBT
2008
ACM
236views Database» more  EDBT 2008»
16 years 5 months ago
Virtualization and databases: state of the art and research challenges
ng the abstract view of computing resources from the implementation of these resources of indirection between abstract view and implementation of resources - Hides implementation d...
Ashraf Aboulnaga, Cristiana Amza, Kenneth Salem