Sciweavers

529 search results - page 78 / 106
» A Fair Non-repudiation Protocol
Sort
View
DRM
2004
Springer
14 years 1 months ago
A DRM security architecture for home networks
This paper describes a security architecture allowing digital rights management in home networks consisting of consumer electronic devices. The idea is to allow devices to establi...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
INDOCRYPT
2003
Springer
14 years 1 months ago
Practical Mental Poker Without a TTP Based on Homomorphic Encryption
A solution for obtaining impartial random values in on-line gambling is presented in this paper. Unlike most previous proposals, our method does not require any TTP and allows e-ga...
Jordi Castellà-Roca, Josep Domingo-Ferrer, ...
CDC
2009
IEEE
145views Control Systems» more  CDC 2009»
14 years 16 days ago
On performance limitations of congestion control
Abstract— Fundamental performance limitations on congestion control is discussed in relation to the information that is available in the controller. Three control architectures t...
Henrik Sandberg, Håkan Hjalmarsson, Ulf T. J...
ICMCS
2000
IEEE
80views Multimedia» more  ICMCS 2000»
14 years 7 days ago
LDA+: A TCP-Friendly Adaptation Scheme for Multimedia Communication
— In this paper, we present an end-to-end adaptation scheme, called the enhanced loss-delay based adaptation algorithm (LDA+), for regulating the transmission behavior of multime...
Dorgham Sisalem, Adam Wolisz
FC
2008
Springer
81views Cryptology» more  FC 2008»
13 years 9 months ago
Don't Clog the Queue! Circuit Clogging and Mitigation in P2P Anonymity Schemes
At Oakland 2005, Murdoch and Danezis described an attack on the Tor anonymity service that recovers the nodes in a Tor circuit, but not the client. We observe that in a peer-to-pee...
Jon McLachlan, Nicholas Hopper