Sciweavers

2702 search results - page 279 / 541
» Message from the Editor
Sort
View
ISCAS
2005
IEEE
133views Hardware» more  ISCAS 2005»
15 years 10 months ago
Sub-sequence video coding for improved temporal scalability
—Compression efficiency and bitrate scalability are among the key factors in video coding. The paper introduces novel sub-sequence coding techniques for temporal scalability. The...
Dong Tian, Miska M. Hannuksela, Moncef Gabbouj
P2P
2005
IEEE
15 years 10 months ago
Toward Overlay Network Symbiosis
Simultaneous overlay networks compete for network resources and disrupt each other. If they cooperate with each other, the collective performance can be improved and they can coex...
Naoki Wakamiya, Masayuki Murata
CRYPTO
2005
Springer
116views Cryptology» more  CRYPTO 2005»
15 years 10 months ago
New Monotones and Lower Bounds in Unconditional Two-Party Computation
Since bit and string oblivious transfer and commitment, two primitives of paramount importance in secure two- and multi-party computation, cannot be realized in an unconditionally ...
Stefan Wolf, Jürg Wullschleger
159
Voted
STACS
2005
Springer
15 years 10 months ago
Quantum Interactive Proofs with Competing Provers
This paper studies quantum refereed games, which are quantum interactive proof systems with two competing provers: one that tries to convince the verifier to accept and the other...
Gus Gutoski, John Watrous
ACISP
2004
Springer
15 years 10 months ago
Weak Property of Malleability in NTRUSign
A new type of signature scheme, called NTRUSign, based on solving the approximately closest vector problem in a NTRU lattice was proposed at CT-RSA’03. However no security proof ...
SungJun Min, Go Yamamoto, Kwangjo Kim