Sciweavers

729 search results - page 82 / 146
» And Or Hierarchies and Round Abstraction
Sort
View
ICALP
2005
Springer
14 years 3 months ago
Basing Cryptographic Protocols on Tamper-Evident Seals
Abstract. In this paper we attempt to formally study two very intuitive physical models: sealed envelopes and locked boxes, often used as illustrations for common cryptographic ope...
Tal Moran, Moni Naor
INFOCOM
2003
IEEE
14 years 3 months ago
On Multicast Trees: Structure and Size Estimation
Abstract— This work presents a thorough investigation of the structure of multicast trees cut from the Internet and power-law topologies. Based on both generated topologies and r...
Danny Dolev, Osnat Mokryn, Yuval Shavitt
EUROCRYPT
2001
Springer
14 years 2 months ago
Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems
Abstract. We show that finding an efficiently computable injective homomorphism from the XTR subgroup into the group of points over GF(p2 ) of a particular type of supersingular e...
Eric R. Verheul
INFOCOM
2000
IEEE
14 years 2 months ago
Collision Avoidance and Resolution Multiple Access for Multichannel Wireless Networks
Abstract—We introduce and analyze CARMA-MC (for Collision Avoidance and Resolution Multiple Access MultiChannel), a new stable channel access protocol for multihop wireless netwo...
Rodrigo Garcés, J. J. Garcia-Luna-Aceves
INFOCOM
2000
IEEE
14 years 2 months ago
A New Fair Window Algorithm for ECN-Capable TCP (New-ECN)
Abstract—In this paper we propose a modification of the Explicit Congestion Notification (ECN) [1] to correct the bias against connections with long round trip times (RTT) of T...
Tilo Hamann, Jean C. Walrand