Sciweavers

1166 search results - page 23 / 234
» Adaptively Secure Broadcast
Sort
View
MONET
2002
120views more  MONET 2002»
13 years 10 months ago
Energy-Efficient Broadcast and Multicast Trees in Wireless Networks
The wireless networking environment presents formidable challenges to the study of broadcasting and multicasting problems. In this paper we focus on the problem of multicast tree c...
Jeffrey E. Wieselthier, Gam D. Nguyen, Anthony Eph...
ASIACRYPT
2003
Springer
14 years 4 months ago
Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes
Abstract. We study two closely related primitives: Broadcast Encryption and Key Predistribution Schemes (KPS). Broadcast Encryption allows a broadcaster to broadcast an encrypted m...
Nuttapong Attrapadung, Kazukuni Kobara, Hideki Ima...
ICMCS
2007
IEEE
123views Multimedia» more  ICMCS 2007»
14 years 5 months ago
BOPPER: Wireless Video Broadcasting with Peer-to-Peer Error Recovery
Wireless digital video broadcasting has experienced much success in recent years with some industrial systems deployed. We study in this paper how to recover lost packets in video...
Shenjie Li, S.-H. Gary Chan
SSS
2007
Springer
100views Control Systems» more  SSS 2007»
14 years 5 months ago
Stability of the Multiple-Access Channel Under Maximum Broadcast Loads
We investigate deterministic broadcasting on multiple-access channels in the framework of adversarial queuing. A protocol is stable when the number of packets stays bounded, and it...
Bogdan S. Chlebus, Dariusz R. Kowalski, Mariusz A....
EUROCRYPT
2004
Springer
14 years 4 months ago
Black-Box Composition Does Not Imply Adaptive Security
In trying to provide formal evidence that composition has security increasing properties, we ask if the composition of non-adaptively secure permutation generators necessarily pro...
Steven Myers