Sciweavers

505 search results - page 9 / 101
» Message from General Co-Chairs
Sort
View
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
13 years 13 days ago
Online Ciphers from Tweakable Blockciphers
Abstract. Online ciphers are deterministic length-preserving permutations EK : ({0, 1}n )+ → ({0, 1}n )+ where the i-th block of ciphertext depends only on the first i blocks of...
Phillip Rogaway, Haibin Zhang
ISCA
1998
IEEE
119views Hardware» more  ISCA 1998»
14 years 1 months ago
Using Prediction to Accelerate Coherence Protocols
Most large shared-memory multiprocessors use directory protocols to keep per-processor caches coherent. Some memory references in such systems, however, suffer long latencies for ...
Shubhendu S. Mukherjee, Mark D. Hill
HICSS
2006
IEEE
123views Biometrics» more  HICSS 2006»
14 years 3 months ago
Reexamining Media Capacity Theories Using Workplace Instant Messaging
This study empirically examines the general propositions of media capacity theories using a newer and increasing popular communication medium: Instant Messaging. We developed hypo...
Yu-Ting Caisy Hung, Wei-Chang Kong, Ai-Ling Chua, ...
ICALP
2005
Springer
14 years 2 months ago
Single-Key AIL-MACs from Any FIL-MAC
Abstract. We investigate a general paradigm for constructing arbitraryinput-length (AIL) MACs from fixed-input-length (FIL) MACs, define the waste as the relevant efficiency para...
Ueli M. Maurer, Johan Sjödin
GLOBECOM
2006
IEEE
14 years 3 months ago
Relay Channel with Private Messages
Abstract—The relay channel with private messages (RCPM) is a generalized relay channel model where in addition to the traditional communication from source to destination (assist...
Ramy Tannious, Aria Nosratinia