Sciweavers

330 search results - page 22 / 66
» Controlling data disclosure in computational PIR protocols
Sort
View
BROADNETS
2007
IEEE
14 years 1 months ago
Route diversity: A future for transmission protocols?
—This contribution is attempting to show how a route diversity can improve the traffic behavior of a connection between two network entities. The most used transmission protocol...
Foued Melakessou, Ulrich Sorger, Zdzislaw Suchanec...
ICA3PP
2005
Springer
14 years 1 months ago
Object-Oriented Design and Implementations of 3G-324M Protocol Stack
Abstract. This paper describes an object-oriented design and efficient implementation of 3G-324M protocol stack for real-time multimedia transmission. In particular, we discuss the...
Weijia Jia, Haohuan Fu, Ji Shen
ICNP
1998
IEEE
13 years 12 months ago
A Lossless, Minimal Latency Protocol for Gigabit ATM Networks
Advances in ber-optic and VLSI technology have led to the emergence of very high-speed networks based on Asynchronous Transfer Mode ATM. The time required to transmit the data int...
Michael D. Santos, P. M. Melliar-Smith, Louise E. ...
PDCAT
2007
Springer
14 years 1 months ago
Privacy Preserving Set Intersection Protocol Secure against Malicious Behaviors
When datasets are distributed on different sources, finding out their intersection while preserving the privacy of the datasets is a widely required task. In this paper, we addre...
Yingpeng Sang, Hong Shen
SAC
2009
ACM
14 years 2 months ago
Secure web-based retrieval of documents with usage controls
Usage controls enable the provider of some information to limit how recipients may use it. Usage controls may be desirable in enterprise environments, e.g., for regulatory complia...
Peter Djalaliev, José Carlos Brustoloni