Sciweavers

3318 search results - page 406 / 664
» The Weak Instance Model
Sort
View
FOCS
2007
IEEE
15 years 10 months ago
Strongly History-Independent Hashing with Applications
We present a strongly history independent (SHI) hash table that supports search in O(1) worst-case time, and insert and delete in O(1) expected time using O(n) data space. This ma...
Guy E. Blelloch, Daniel Golovin
VTC
2007
IEEE
15 years 10 months ago
Packet Centric vs. Radio Centric Link Layer Approaches: A Quantitative Analysis
Abstract— A well-known concept to adapt the transmitted payload to the current channel capacity is to perform segmentation of the uncoded user payload. In [1], a new cross layera...
Francesco Rossetto, Michael Meyer, Michele Zorzi
AIRWEB
2007
Springer
15 years 10 months ago
Using Spam Farm to Boost PageRank
Nowadays web spamming has emerged to take the economic advantage of high search rankings and threatened the accuracy and fairness of those rankings. Understanding spamming techniq...
Ye Du, Yaoyun Shi, Xin Zhao
ESORICS
2007
Springer
15 years 10 months ago
Synthesizing Secure Protocols
Abstract. We propose a general transformation that maps a cryptographic protocol that is secure in an extremely weak sense (essentially in a model where no adversary is present) in...
Véronique Cortier, Bogdan Warinschi, Eugen ...
FC
2007
Springer
111views Cryptology» more  FC 2007»
15 years 10 months ago
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting
A multi-coupon (MC) represents a collection of k coupons that a user can redeem to a vendor in exchange for some goods or services. Nguyen (FC 2006), deepening the ideas of Chen et...
Liqun Chen, Alberto N. Escalante, Hans Löhr, ...