Sciweavers

644 search results - page 15 / 129
» Adaptive security protocol selection for mobile computing
Sort
View
CRYPTO
2008
Springer
76views Cryptology» more  CRYPTO 2008»
13 years 8 months ago
Scalable Multiparty Computation with Nearly Optimal Work and Resilience
We present the first general protocol for secure multiparty computation in which the total amount of work required by n players to compute a function f grows only polylogarithmical...
Ivan Damgård, Yuval Ishai, Mikkel Krø...
ICPPW
1999
IEEE
13 years 11 months ago
On Dynamically Adapting Registration Areas to User Mobility Patterns in PCS Networks
Location management is an essential service in mobile networks. It provides mechanisms for recording and querying location of mobile units in the network. This is needed for estab...
Georgios Varsamopoulos, Sandeep K. S. Gupta
RTAS
1996
IEEE
13 years 11 months ago
AIDA-based real-time fault-tolerant broadcast disks
The proliferation of mobile computers and wireless networks requires the design of future distributed real-time applications to recognize and deal with the signi cant asymmetry be...
Azer Bestavros
EUROCRYPT
2010
Springer
13 years 11 months ago
Adaptively Secure Broadcast
A broadcast protocol allows a sender to distribute a message through a point-to-point network to a set of parties, such that (i) all parties receive the same message, even if the s...
Martin Hirt, Vassilis Zikas
PKC
2009
Springer
164views Cryptology» more  PKC 2009»
14 years 7 months ago
Asynchronous Multiparty Computation: Theory and Implementation
Abstract. We propose an asynchronous protocol for general multiparty computation with perfect security and communication complexity O(n2 |C|k) where n is the number of parties, |C|...
Ivan Damgård, Jesper Buus Nielsen, Martin Ge...