Sciweavers

517 search results - page 36 / 104
» Bit Encryption Is Complete
Sort
View
ASIACRYPT
2007
Springer
14 years 2 months ago
Two-Party Computing with Encrypted Data
We consider a new model for online secure computation on encrypted inputs in the presence of malicious adversaries. The inputs are independent of the circuit computed in the sense ...
Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malki...
ISW
2007
Springer
14 years 2 months ago
Towards a DL-Based Additively Homomorphic Encryption Scheme
ElGamal scheme has been the first encryption scheme based on discrete logarithm. One of its main advantage is that it is simple, natural and efficient, but also that its security ...
Guilhem Castagnos, Benoît Chevallier-Mames
TSD
2004
Springer
14 years 1 months ago
Dynamic Unit Selection for Very Low Bit Rate Coding at 500 bits/sec
This paper presents a new unit selection process for Very Low Bit Rate speech encoding around 500 bits/sec. The encoding is based on speech recognition and speech synthesis technol...
Marc Padellini, François Capman, Genevi&egr...
IPPS
2010
IEEE
13 years 6 months ago
BitTorrent and fountain codes: friends or foes?
Abstract--BitTorrent is the most popular file sharing protocol on the Internet. It is proved that its performance are nearoptimal for generic file distribution when the overlay is ...
Salvatore Spoto, Rossano Gaeta, Marco Grangetto, M...
ICNP
2006
IEEE
14 years 2 months ago
The Delicate Tradeoffs in BitTorrent-like File Sharing Protocol Design
— The BitTorrent (BT) file sharing protocol is popular due to its scalability property and the incentive mechanism to reduce free-riding. However, in designing such P2P file sh...
Bin Fan, Dah-Ming Chiu, John C. S. Lui