Sciweavers

261 search results - page 48 / 53
» Efficient Recovery in Harp
Sort
View
SOUPS
2010
ACM
14 years 1 months ago
Usably secure, low-cost authentication for mobile banking
This paper explores user authentication schemes for banking systems implemented over mobile phone networks in the developing world. We analyze an authentication scheme currently d...
Saurabh Panjwani, Edward Cutrell
EUROCRYPT
2004
Springer
14 years 1 months ago
Anonymous Identification in Ad Hoc Groups
We introduce Ad Hoc Anonymous Identification schemes, a new multi-user cryptographic primitive that allows participants from a user population to form ad hoc groups, and then prove...
Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi,...
COMCOM
2008
80views more  COMCOM 2008»
13 years 10 months ago
Robust video-on-demand streaming in peer-to-peer environments
This paper presents a new video-on-demand streaming technique in peer-to-peer (P2P) environments. While a number of P2P live video streaming techniques have been proposed in the p...
Tai T. Do, Kien A. Hua, Mounir A. Tantaoui
CORR
2008
Springer
120views Education» more  CORR 2008»
13 years 10 months ago
Network Protection Codes: Providing Self-healing in Autonomic Networks Using Network Coding
Agile recovery from link failures in autonomic communication networks is essential to increase robustness, accessibility, and reliability of data transmission. However, this must b...
Salah A. Aly, Ahmed E. Kamal
EOR
2008
106views more  EOR 2008»
13 years 10 months ago
Convergent Lagrangian heuristics for nonlinear minimum cost network flows
We consider the separable nonlinear and strictly convex single-commodity network flow problem (SSCNFP). We develop a computational scheme for generating a primal feasible solution...
Torbjörn Larsson, Johan Marklund, Caroline Ol...