Sciweavers

598 search results - page 87 / 120
» A fair certification protocol
Sort
View
TPDS
2008
116views more  TPDS 2008»
13 years 9 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
FOCS
2006
IEEE
14 years 3 months ago
Secure Multiparty Quantum Computation with (Only) a Strict Honest Majority
Secret sharing and multiparty computation (also called “secure function evaluation”) are fundamental primitives in modern cryptography, allowing a group of mutually distrustfu...
Michael Ben-Or, Claude Crépeau, Daniel Gott...

Publication
304views
15 years 8 months ago
A Binary Feedback Scheme for Congestion Avoidance in Computer Networks with Connectionless Network Layer
We propose a scheme for congestion avoidance in networks using a connectionless protocol at the network layer. The scheme uses a minimal amount of feedback from the network to the ...
K. Ramakrishnan and R. Jain
ISCC
2009
IEEE
147views Communications» more  ISCC 2009»
14 years 4 months ago
P2P cache-and-forward mechanisms for mobile ad hoc networks
We investigate the problem of spreading information contents in a wireless ad hoc network. In our vision, information dissemination should satisfy the following requirements: (i) ...
Claudio Casetti, Carla-Fabiana Chiasserini, Marco ...
CISS
2008
IEEE
14 years 4 months ago
Incorporating retransmission diversity in quality-of-service guaranteed multi-user scheduling
Abstract— A cross-layer optimization combining retransmission diversity with multi-user diversity is investigated for wireless communications. To this end, a joint design of adap...
Xin Wang, Di Wang, Irena Li, Hanqi Zhuang, Salvato...