Sciweavers

90 search results - page 15 / 18
» Asymmetric Group Key Agreement
Sort
View
STOC
2010
ACM
193views Algorithms» more  STOC 2010»
14 years 50 min ago
Privacy Amplification with Asymptotically Optimal Entropy Loss
We study the problem of "privacy amplification": key agreement between two parties who both know a weak secret w, such as a password. (Such a setting is ubiquitous on th...
Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostr...
CSFW
2005
IEEE
14 years 2 months ago
Temporal Rank Functions for Forward Secrecy
A number of key establishment protocols claim the property of forward secrecy, where the compromise of a longterm key does not result in the compromise of previously computed sess...
Rob Delicata, Steve A. Schneider
CSDA
2006
92views more  CSDA 2006»
13 years 8 months ago
Robust measures of tail weight
The kurtosis coefficient is often regarded as a measure of the tail heaviness of a distribution relative to that of the normal distribution. However, it also measures the peakedne...
Guy Brys, Mia Hubert, Anja Struyf
CN
2004
140views more  CN 2004»
13 years 8 months ago
Mobile hop-by-hop multicast routing
This work focuses on mobility management in a multicast environment. Traditional solutions, based either on bi-directional tunneling or on remote subscription, have different draw...
Rolland Vida, Luís Henrique Maciel Kosmalsk...
AMC
2008
111views more  AMC 2008»
13 years 8 months ago
Chemical agent detector placement methodology
Terrorism is a threat to global peace in our world today and in the future this terrorist threat is surely going to be important. Global terrorist groups have highly sophisticated...
Cevriye Gencer, Emel Kizilkaya Aydogan, Abdullah S...