Sciweavers

86 search results - page 12 / 18
» Impossibility Results for Secret Establishment
Sort
View
FOCS
2009
IEEE
14 years 2 months ago
Bit Encryption Is Complete
Abstract— Under CPA and CCA1 attacks, a secure bit encryption scheme can be applied bit-by-bit to construct a secure many-bit encryption scheme. The same construction fails, howe...
Steven Myers, Abhi Shelat
NOMS
2008
IEEE
14 years 2 months ago
Monitoring scheduling for home gateways
— In simple and monolithic systems such as our current home gateways, monitoring is often overlooked: the home user can only reboot the gateway when there is a problem. In next-g...
Stéphane Frénot, Yvan Royon, Pierre ...
CIA
2006
Springer
13 years 11 months ago
The Distortion of Cardinal Preferences in Voting
The theoretical guarantees provided by voting have distinguished it as a prominent method of preference aggregation among autonomous agents. However, unlike humans, agents usually ...
Ariel D. Procaccia, Jeffrey S. Rosenschein
ICMCS
2010
IEEE
210views Multimedia» more  ICMCS 2010»
13 years 8 months ago
Confidence evaluation for robust, fast-converging disparity map refinement
To improve upon the initial disparity estimates stemming from a local correspondence method, a subsequent refinement step is commonly employed. The performance of the stereo match...
Jorn Jachalsky, Markus Schlosser, Dirk Gandolph
ICDCS
2011
IEEE
12 years 7 months ago
JR-SND: Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks
Abstract—Secure neighbor discovery is fundamental to mobile ad hoc networks (MANETs) deployed in hostile environments and refers to the process in which two neighboring nodes exc...
Rui Zhang 0007, Yanchao Zhang, Xiaoxia Huang