Sciweavers

292 search results - page 4 / 59
» Communication and Round Efficient Information Checking Proto...
Sort
View
TKDE
2008
111views more  TKDE 2008»
13 years 7 months ago
Efficient Remote Data Possession Checking in Critical Information Infrastructures
Checking data possession in networked information systems such as those related to critical infrastructures (power facilities, airports, data vaults, defense systems, and so forth)...
Francesc Sebé, Josep Domingo-Ferrer, Antoni...
ACNS
2006
Springer
138views Cryptology» more  ACNS 2006»
13 years 11 months ago
Syntax-Driven Private Evaluation of Quantified Membership Queries
Abstract. Membership queries are basic predicate operations that apply to datasets. Quantifications of such queries express global properties between datasets, including subset inc...
Aggelos Kiayias, Antonina Mitrofanova
JCP
2006
120views more  JCP 2006»
13 years 7 months ago
Password-authenticated Key Exchange using Efficient MACs
Abstract-- This paper is concerned with passwordauthenticated key agreement protocols. Designing such protocols represents an interesting challenge since there is no standard way o...
Maurizio Adriano Strangio
GLOBECOM
2007
IEEE
13 years 9 months ago
Dense Parity Check Based Secrecy Sharing in Wireless Communications
Abstract—It is generally believed harmful to have transmission errors in the wireless communications. The high decoding complexity of dense parity check codes is unfavorable. Thi...
Sheng Xiao, Hossein Pishro-Nik, Weibo Gong
ICALP
2003
Springer
14 years 17 days ago
A Direct Sum Theorem in Communication Complexity via Message Compression
We prove lower bounds for the direct sum problem for two-party bounded error randomised multipleround communication protocols. Our proofs use the notion of information cost of a p...
Rahul Jain, Jaikumar Radhakrishnan, Pranab Sen