Sciweavers

2421 search results - page 313 / 485
» Message from the Co-Chairs
Sort
View
ACNS
2004
Springer
106views Cryptology» more  ACNS 2004»
14 years 3 months ago
On the Security of Cryptosystems with All-or-Nothing Transform
We study the data privacy of cryptosystems with All-or-Nothing transform (AONT). An AONT is an efficient computable transform with two properties: Given all the bits of its output...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
APPROX
2004
Springer
149views Algorithms» more  APPROX 2004»
14 years 3 months ago
Edge Coloring with Delays
Consider the following communication problem, that leads to a new notion of edge coloring. The communication network is represented by a bipartite multigraph, where the nodes on o...
Noga Alon, Vera Asodi
CIA
2004
Springer
14 years 3 months ago
Reasoning About Communication - A Practical Approach Based on Empirical Semantics
Given a specification of communication rules in a multiagent system (in the form of protocols, ACL semantics, etc.), the question of how to design appropriate agents that can oper...
Felix A. Fischer, Michael Rovatsos
ICCSA
2004
Springer
14 years 3 months ago
A Scheme for Improving WEP Key Transmission between APs in Wireless Environment
Abstract. Wireless LAN (WLAN) refers to the wireless network environment constructed indoors or outdoors, by using either the radio or light wave technology instead of wire signals...
Chi Hyung In, Choong Seon Hong, Il Gyu Song
POLICY
2004
Springer
14 years 3 months ago
A Policy Driven Approach to Email Services
The primary original design goal for email was to provide best-effort message delivery. Unfortunately, as the ever increasing uproar over SPAM demonstrates, the existing email inf...
Saket Kaushik, Paul Ammann, Duminda Wijesekera, Wi...