Sciweavers

2702 search results - page 249 / 541
» Message from the Editor
Sort
View
ASIACRYPT
2007
Springer
15 years 11 months ago
Two-Party Computing with Encrypted Data
We consider a new model for online secure computation on encrypted inputs in the presence of malicious adversaries. The inputs are independent of the circuit computed in the sense ...
Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malki...
BIOWIRE
2007
Springer
15 years 11 months ago
Epcast: Controlled Dissemination in Human-Based Wireless Networks Using Epidemic Spreading Models
Epidemics-inspired techniques have received huge attention in recent years from the distributed systems and networking communities. These algorithms and protocols rely on probabili...
Salvatore Scellato, Cecilia Mascolo, Mirco Musoles...
147
Voted
EUROCRYPT
2007
Springer
15 years 11 months ago
Simulatable Adaptive Oblivious Transfer
We study an adaptive variant of oblivious transfer in which a sender has N messages, of which a receiver can adaptively choose to receive k one-after-the-other, in such a way that ...
Jan Camenisch, Gregory Neven, Abhi Shelat
HPCC
2007
Springer
15 years 11 months ago
MC2DR: Multi-cycle Deadlock Detection and Recovery Algorithm for Distributed Systems
Abstract. Even though there have been many research works on distributed deadlock detection and recovery mechanisms, the multi-cycle deadlock problems are not extensively studied y...
Md. Abdur Razzaque, Md. Mamun-Or-Rashid, Choong Se...
MSN
2007
Springer
192views Sensor Networks» more  MSN 2007»
15 years 10 months ago
Secure Group Communication with Self-healing and Rekeying in Wireless Sensor Networks
We have developed a self-healing key distribution scheme for secure multicast group communications for wireless sensor network environment. We present a strategy for securely distr...
Firdous Kausar, Sajid Hussain, Jong Hyuk Park, Ash...