Sciweavers

292 search results - page 8 / 59
» Communication and Round Efficient Information Checking Proto...
Sort
View
COCO
2005
Springer
110views Algorithms» more  COCO 2005»
14 years 28 days ago
Prior Entanglement, Message Compression and Privacy in Quantum Communication
Consider a two-party quantum communication protocol for computing some function f : {0, 1}n × {0, 1}n → Z. We show that the first message of P can be compressed to O(k) classi...
Rahul Jain, Jaikumar Radhakrishnan, Pranab Sen
IJMI
2010
149views more  IJMI 2010»
13 years 5 months ago
Analysis of communicative behaviour: Profiling roles and activities
In this paper, we discuss how profiles of communicative behaviour can be used to present and analyse information about role activity recorded through structured observation of spec...
Inger Dybdahl Sørby, Øystein Nytr&os...
ICISC
2008
89views Cryptology» more  ICISC 2008»
13 years 8 months ago
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks
Group key agreement (GKA) allows a set of players to establish a shared secret and thus bootstrap secure group communication. GKA is very useful in many types of peer group scenar...
Jihye Kim, Gene Tsudik
TCC
2010
Springer
208views Cryptology» more  TCC 2010»
14 years 4 months ago
Rationality in the Full-Information Model
We study rationality in protocol design for the full-information model, a model characterized by computationally unbounded adversaries, no private communication, and no simultanei...
Ronen Gradwohl
CCGRID
2001
IEEE
13 years 11 months ago
xBSP: An Efficient BSP Implementation for clan
Virtual Interface Architecture(VIA) is a light-weight protocol for protected user-level zero-copy communication. In spite of high performance of VIA, the previous MPI implementati...
Yang-Suk Kee, Soonhoi Ha