Sciweavers

1166 search results - page 30 / 234
» Adaptively Secure Broadcast
Sort
View
CORR
2008
Springer
73views Education» more  CORR 2008»
13 years 11 months ago
Secrecy Capacity of a Class of Broadcast Channels with an Eavesdropper
We study the security of communication between a single transmitter and multiple receivers in a broadcast channel in the presence of an eavesdropper. Characterizing the secrecy ca...
Ersen Ekrem, Sennur Ulukus
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
13 years 8 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
ICASSP
2008
IEEE
14 years 5 months ago
An unsupervised web-based topic language model adaptation method
This paper focuses on a solution to better adapt ASR systems, whose language models (LM) are usually trained on topic-independent corpora, to new topics, in particular in the case...
Gwénolé Lecorvé, Guillaume Gr...
EUROCRYPT
2009
Springer
14 years 11 months ago
A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
Recently, at Crypto 2008, Boneh, Halevi, Hamburg, and Ostrovsky (BHHO) solved the longstanding open problem of "circular encryption," by presenting a public key encrypti...
Jan Camenisch, Nishanth Chandran, Victor Shoup
ICMCS
2005
IEEE
127views Multimedia» more  ICMCS 2005»
14 years 4 months ago
Asynchronous Media Streaming Over Wireless Broadcast Channels
We consider wireless broadcasting of multimedia content to allow asynchronous media access. Receivers subscribe at any time to the ongoing broadcast session, but are still able to...
Hrvoje Jenkac, Thomas Stockhammer