Sciweavers

598 search results - page 51 / 120
» A fair certification protocol
Sort
View
ISCI
2008
160views more  ISCI 2008»
13 years 10 months ago
Certificateless undeniable signature scheme
In this paper, we present the first certificateless undeniable signature scheme. The scheme does not suffer from the key escrow problem, which is inherent in identity based crypto...
Shanshan Duan
COMCOM
2000
79views more  COMCOM 2000»
13 years 9 months ago
Jikzi - a new framework for security policy, trusted publishing and electronic commerce
In this paper, we describe a thread of research which we have followed off and on at Cambridge for about three years. Our topic is the security of electronic documents, in the bro...
Ross J. Anderson, Jong-Hyeon Lee
INFOCOM
2009
IEEE
14 years 4 months ago
RAPID: Shrinking the Congestion-Control Timescale
Abstract—TCP congestion-control is fairly inefficient in achieving high throughput in high-speed and dynamic-bandwidth environments. The main culprit is the slow bandwidth-searc...
Vishnu Vardhan Reddy Konda, Jasleen Kaur
CIC
2004
143views Communications» more  CIC 2004»
13 years 11 months ago
TCP Vegas-like Algorithm for Layered multicast Transmission
Layered multicast is probably the most elegant solution to tackle the heterogene ity problem in multicast delivery of real-time multimedia streams. However, the multiple join expe...
Omar Ait-Hellal, Guy Leduc
PROMS
2001
Springer
176views Multimedia» more  PROMS 2001»
14 years 2 months ago
A Mechanism for Multicast Multimedia Data with Adaptive QoS Characteristics
In this paper, we describe a mechanism for adaptive transmission of multimedia data, which is based on real time protocols. The proposed mechanism can be used for multicast multime...
Christos Bouras, Apostolos Gkamas