Sciweavers

36 search results - page 6 / 8
» A Secure Two Phase Locking Protocol
Sort
View
DPD
2000
71views more  DPD 2000»
13 years 10 months ago
A Secure Agent-based Framework for Internet Trading in Mobile Computing Environments
Most of the current Internet trading frameworks, in particular their negotiation and payment phases, are intended for customers frequently connected to the Internet during an entir...
Xun Yi, Chee Kheong Siew, Xiao Feng Wang, Eiji Oka...
CISS
2007
IEEE
14 years 5 months ago
Coherent Optical CDMA with low MAI
Abstract. Spectrally phase-coded optical code division multiple access (OCDMA), demodulated with phase and polarization diversity devices, exhibits high spectral efficiency and low...
A. Brinton Cooper, Jacob B. Khurgin, Shuangmei Xu,...
JOC
2007
94views more  JOC 2007»
13 years 10 months ago
On Unconditionally Secure Distributed Oblivious Transfer
This paper is about the Oblivious Transfer in the distributed model proposed by M. Naor and B. Pinkas. In this setting a Sender has n secrets and a Receiver is interested in one o...
Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Dou...
FPL
2004
Springer
154views Hardware» more  FPL 2004»
14 years 4 months ago
High Performance True Random Number Generator in Altera Stratix FPLDs
Abstract. The paper presents a high performance True Random Number Generator (TRNG) embedded in Altera Stratix Field Programmable Logic Devices (FPLDs). As a source of randomness, ...
Viktor Fischer, Milos Drutarovský, Martin S...
TCC
2007
Springer
104views Cryptology» more  TCC 2007»
14 years 5 months ago
Unifying Classical and Quantum Key Distillation
Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state ρABE. In addition, ...
Matthias Christandl, Artur Ekert, Michal Horodecki...