Sciweavers

529 search results - page 76 / 106
» A Fair Non-repudiation Protocol
Sort
View
FOCS
2006
IEEE
14 years 1 months ago
Secure Multiparty Quantum Computation with (Only) a Strict Honest Majority
Secret sharing and multiparty computation (also called “secure function evaluation”) are fundamental primitives in modern cryptography, allowing a group of mutually distrustfu...
Michael Ben-Or, Claude Crépeau, Daniel Gott...

Publication
304views
15 years 6 months ago
A Binary Feedback Scheme for Congestion Avoidance in Computer Networks with Connectionless Network Layer
We propose a scheme for congestion avoidance in networks using a connectionless protocol at the network layer. The scheme uses a minimal amount of feedback from the network to the ...
K. Ramakrishnan and R. Jain
ISCC
2009
IEEE
147views Communications» more  ISCC 2009»
14 years 2 months ago
P2P cache-and-forward mechanisms for mobile ad hoc networks
We investigate the problem of spreading information contents in a wireless ad hoc network. In our vision, information dissemination should satisfy the following requirements: (i) ...
Claudio Casetti, Carla-Fabiana Chiasserini, Marco ...
CISS
2008
IEEE
14 years 2 months ago
Incorporating retransmission diversity in quality-of-service guaranteed multi-user scheduling
Abstract— A cross-layer optimization combining retransmission diversity with multi-user diversity is investigated for wireless communications. To this end, a joint design of adap...
Xin Wang, Di Wang, Irena Li, Hanqi Zhuang, Salvato...
GLOBECOM
2007
IEEE
14 years 2 months ago
Leader-Based Rate Adaptive Multicasting for Wireless LANs
—Multicasting is useful for various applications such as multimedia broadcasting. In current 802.11, multicast frames are sent as broadcast frames at a low transmission rate with...
Sungjoon Choi, Nakjung Choi, Yongho Seok, Taekyoun...