Sciweavers

1342 search results - page 256 / 269
» Attacks are Protocols Too
Sort
View
EUROCRYPT
1999
Springer
13 years 11 months ago
On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions
We consider the problem of basing Oblivious Transfer (OT) and Bit Commitment (BC), with information theoretic security, on seemingly weaker primitives. We introduce a general model...
Ivan Damgård, Joe Kilian, Louis Salvail
EENERGY
2010
13 years 11 months ago
Mobile networks unplugged
Mobile network access has seemingly become ubiquitous in industrialized countries. With data services becoming sufficiently fast, usable, and affordable, demand is growing rapidly...
Jukka Manner, Marko Luoma, Jörg Ott, Jyri H&a...
FLAIRS
2004
13 years 8 months ago
The Mobile Agents Integrated Field Test
The Mobile Agents model-based, distributed architecture, which integrates diverse components in a system for lunar and planetary surface operations, was extensively tested in a tw...
William J. Clancey, Maarten Sierhuis, Rich Alena, ...
SIGCOMM
2010
ACM
13 years 7 months ago
Greening backbone networks: reducing energy consumption by shutting off cables in bundled links
In backbone networks, the line cards that drive the links between neighboring routers consume a large amount of energy. Since these networks are typically overprovisioned, selecti...
Will Fisher, Martin Suchara, Jennifer Rexford
CCR
2008
120views more  CCR 2008»
13 years 7 months ago
OpenFlow: enabling innovation in campus networks
This whitepaper proposes OpenFlow: a way for researchers to run experimental protocols in the networks they use every day. OpenFlow is based on an Ethernet switch, with an interna...
Nick McKeown, Tom Anderson, Hari Balakrishnan, Gur...