Sciweavers

1798 search results - page 197 / 360
» A Tree for All Seasons
Sort
View
PQCRYPTO
2010
250views Cryptology» more  PQCRYPTO 2010»
14 years 1 months ago
Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles
Abstract. We propose a variant of the “bonsai tree” signature scheme, a latticebased existentially unforgeable signature scheme in the standard model. Our construction offers ...
Markus Rückert
ESEM
2007
ACM
14 years 1 months ago
The Effects of Over and Under Sampling on Fault-prone Module Detection
The goal of this paper is to improve the prediction performance of fault-prone module prediction models (fault-proneness models) by employing over/under sampling methods, which ar...
Yasutaka Kamei, Akito Monden, Shinsuke Matsumoto, ...
ICC
2007
IEEE
128views Communications» more  ICC 2007»
14 years 1 months ago
A Near Optimal Localized Heuristic for Voice Multicasting over Ad Hoc Wireless Networks
Abstract-- Providing real-time voice multicasting over multihop ad hoc wireless networks is a challenging task. The unique characteristics of voice traffic (viz. small packet size,...
G. Venkat Raju, Tamma Bheemarjuna Reddy, C. Siva R...
GLOBECOM
2009
IEEE
14 years 1 months ago
R-Code: Network Coding Based Reliable Broadcast in Wireless Mesh Networks with Unreliable Links
Broadcast is an important primitive in wireless mesh networks (WMNs). Applications like network-wide software update require reliable reception of the content with low-latency and ...
Zhenyu Yang, Ming Li, Wenjing Lou
FSE
2006
Springer
159views Cryptology» more  FSE 2006»
14 years 26 days ago
Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions
The security of hash functions has recently become one of the hottest topics in the design and analysis of cryptographic primitives. Since almost all the hash functions used today ...
Jonathan J. Hoch, Adi Shamir