Sciweavers

231 search results - page 32 / 47
» Generalized Identity Based and Broadcast Encryption Schemes
Sort
View
CRYPTO
2012
Springer
277views Cryptology» more  CRYPTO 2012»
11 years 10 months ago
Multiparty Computation from Somewhat Homomorphic Encryption
We propose a general multiparty computation protocol secure against an active adversary corrupting up to n−1 of the n players. The protocol may be used to compute securely arithm...
Ivan Damgård, Valerio Pastro, Nigel P. Smart...
JCS
2010
112views more  JCS 2010»
13 years 6 months ago
Inductive trace properties for computational security
Protocol authentication properties are generally trace-based, meaning that authentication holds for the protocol if authentication holds for individual traces (runs of the protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
ICMCS
2006
IEEE
120views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Syndrome-Based Light-Weight Video Coding for Mobile Wireless Application
In conventional video coding, the complexity of an encoder is generally much higher than that of a decoder because of operations such as motion estimation consume significant com...
Min Wu, Guogang Hua, Chang Chen
ISCAPDCS
2001
13 years 9 months ago
Optimal Broadcasting in Injured Hypercubes Using Directed Safety Levels
Reliable communication in injured hypercubes with faulty links/nodes using directed safety levels is studied in this paper. In this approach, each node u in an n-dimensional hyper...
Jie Wu
CORR
2006
Springer
140views Education» more  CORR 2006»
13 years 7 months ago
Cooperative Relay Broadcast Channels
The capacity regions are investigated for two relay broadcast channels (RBCs), where relay links are incorporated into two-user broadcast channels to support user cooperation. In t...
Yingbin Liang, Venugopal V. Veeravalli