Sciweavers

525 search results - page 12 / 105
» Threshold Schemes with Disenrollment
Sort
View
SIGMOD
2005
ACM
141views Database» more  SIGMOD 2005»
16 years 2 months ago
Fault-tolerance in the Borealis distributed stream processing system
We present a replication-based approach to fault-tolerant distributed stream processing in the face of node failures, network failures, and network partitions. Our approach aims t...
Magdalena Balazinska, Hari Balakrishnan, Samuel Ma...
141
Voted
EUROPKI
2004
Springer
15 years 7 months ago
Threshold Password-Based Authentication Using Bilinear Pairings
We present a new threshold password-based authentication protocol that allows a roaming user(a user who accesses a network from different client terminals) to download a private k...
Songwon Lee, Kyusuk Han, Seok-kyu Kang, Kwangjo Ki...
117
Voted
ISMVL
2000
IEEE
79views Hardware» more  ISMVL 2000»
15 years 6 months ago
Novel Resonant-Tunneling Multiple-Threshold Logic Circuit Based on Switching Sequence Detection
We present a novel multiple-threshold circuit using resonant-tunneling diodes (RTDs). The logic operation is based on detecting a switching sequence in the RTD circuit. This schem...
Takao Waho, Kazufumi Hattori, Kouji Honda
153
Voted
IACR
2011
196views more  IACR 2011»
14 years 1 months ago
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
Fully homomorphic encryption (FHE) provides a simple template for secure computation between two parties (Alice and Bob) where: (I) Alice encrypts her input under her key, (II) Bo...
Gilad Asharov, Abhishek Jain, Daniel Wichs
121
Voted
ITNG
2007
IEEE
15 years 8 months ago
THIS: THreshold security for Information aggregation in Sensor networks
Message aggregation can be used to reduce the communication overhead in a network where many messages have the “same” content. However, it may make the network less secure bec...
Hai Vu, Neeraj Mittal, Subbarayan Venkatesan