Sciweavers

507 search results - page 74 / 102
» The relation between protocols and games
Sort
View
ASIACRYPT
2000
Springer
15 years 2 months ago
Zero-Knowledge and Code Obfuscation
In this paper, we investigate the gap between auxiliary-input zero-knowledge (AIZK) and blackbox-simulation zero-knowledge (BSZK). It is an interesting open problem whether or not ...
Satoshi Hada
EUROCRYPT
1999
Springer
15 years 1 months ago
Secure Communication in Broadcast Channels: The Answer to Franklin and Wright's Question
Problems of secure communication and computation have been studied extensively in network models. Goldreich, Goldwasser, and Linial, Franklin and Yung, and Franklin and Wright have...
Yongge Wang, Yvo Desmedt
KIVS
1999
Springer
15 years 1 months ago
Cost and Price Calculation for Internet Integrated Services
Abstract Charging schemes are needed to protect an integrated services network from arbitrary resource reservations and to create a funding mechanism to extend network capacity at ...
Martin Karsten, Jens Schmitt, Lars C. Wolf, Ralf S...
HPTS
1993
147views Database» more  HPTS 1993»
15 years 1 months ago
Generic Action Support for Distributed, Cooperative Applications
Elements of transaction processing become more and more accepted as a base for general purpose distributed computing.We have developed an action concept with an extended functiona...
Edgar Nett, Michael Mock
SIGCOMM
1995
ACM
15 years 1 months ago
Two Issues in Reservation Establishment
This paper addresses two issues related to resource reservation establishment in packet switched networks o ering realtime services. The rst issue arises out of the natural tensi...
Scott Shenker, Lee Breslau