Sciweavers

24 search results - page 4 / 5
» A New Protocol for Conditional Disclosure of Secrets and Its...
Sort
View
ALGOSENSORS
2004
Springer
14 years 25 days ago
Multi: A Hybrid Adaptive Dissemination Protocol for Wireless Sensor Networks
Abstract. Data dissemination (routing) is a basic function in wireless sensor networks. Dissemination algorithms for those networks depend on the characteristics of the application...
Carlos Mauricio S. Figueiredo, Eduardo Freire Naka...
STOC
2009
ACM
91views Algorithms» more  STOC 2009»
14 years 8 months ago
Inaccessible entropy
We put forth a new computational notion of entropy, which measures the (in)feasibility of sampling high entropy strings that are consistent with a given protocol. Specifically, we...
Iftach Haitner, Omer Reingold, Salil P. Vadhan, Ho...
PKC
2009
Springer
126views Cryptology» more  PKC 2009»
14 years 8 months ago
Verifiable Rotation of Homomorphic Encryptions
Similar to verifiable shuffling (or, mixing), we consider the problem of verifiable rotating (and random re-encrypting) a given list of homomorphic encryptions. The offset by which...
Sebastiaan de Hoogh, Berry Schoenmakers, Boris Sko...
CIT
2006
Springer
13 years 11 months ago
A Contention Window Based Differentiation Mechanism for providing QoS in Wireless LANs
Running real time applications over wireless LANs is becoming common place. These applications require QoS. But the most widely used wireless LAN, IEEE 802.11, does not have QoS s...
Mayank Mishra, Anirudha Sahoo
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
13 years 8 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny