Sciweavers

2576 search results - page 138 / 516
» The Complexity of Zero Knowledge
Sort
View
146
Voted
INFOCOM
2010
IEEE
15 years 3 months ago
A General Algorithm for Interference Alignment and Cancellation in Wireless Networks
—Physical layer techniques have come a long way and can achieve close to Shannon capacity for single pointto-point transmissions. It is apparent that, to further improve network ...
Erran L. Li, Richard Alimi, Dawei Shen, Harish Vis...
144
Voted
GLOBECOM
2009
IEEE
15 years 2 months ago
SC-FDMA Versus OFDMA: Sensitivity to Large Carrier Frequency and Timing Offsets on the Uplink
In this paper, we present a comparison between the sensitivity of SC-FDMA and OFDMA schemes to large carrier frequency offsets (CFO) and timing offsets (TO) of different users on t...
K. Raghunath, Ananthanarayanan Chockalingam
TCOS
2010
14 years 11 months ago
J-PAKE: Authenticated Key Exchange without PKI
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication be...
Feng Hao, Peter Ryan
162
Voted
PODC
2011
ACM
14 years 7 months ago
Securing social networks
We present a cryptographic framework to achieve access control, privacy of social relations, secrecy of resources, and anonymity of users in social networks. The main idea is to u...
Michael Backes, Matteo Maffei, Kim Pecina
119
Voted
IACR
2011
88views more  IACR 2011»
14 years 4 months ago
Targeted Malleability: Homomorphic Encryption for Restricted Computations
We put forward the notion of targeted malleability: given a homomorphic encryption scheme, in various scenarios we would like to restrict the homomorphic computations one can perf...
Dan Boneh, Gil Segev, Brent Waters