Sciweavers

261 search results - page 39 / 53
» New Constructions of One- and Two-Stage Pooling Designs
Sort
View
IEEEIA
2009
13 years 5 months ago
Agent Based Multipath Routing in Wireless Sensor Networks
recently, mobile agents have been used to solve many problems in wireless sensor networks. Agents are usually transferred from a node to another to aggregate the sensed data and si...
Rabie A. Ramadan
CRYPTO
2000
Springer
133views Cryptology» more  CRYPTO 2000»
13 years 11 months ago
Sequential Traitor Tracing
Traceability schemes allow detection of at least one traitor when a group of colluders attempt to construct a pirate decoder and gain illegal access to digital content. Fiat and Ta...
Reihaneh Safavi-Naini, Yejing Wang
CORR
2011
Springer
174views Education» more  CORR 2011»
13 years 2 months ago
Physical expander in Virtual Tree Overlay
Abstract. In this paper, we propose a new construction of constantdegree expanders motivated by their application in P2P overlay networks and in particular in the design of robust ...
Taisuke Izumi, Maria Potop-Butucaru, Mathieu Valer...
CCS
2007
ACM
14 years 1 months ago
Pors: proofs of retrievability for large files
In this paper, we define and explore proofs of retrievability (PORs). A POR scheme enables an archive or back-up service (prover) to produce a concise proof that a user (verifier...
Ari Juels, Burton S. Kaliski Jr.
CRYPTO
2003
Springer
156views Cryptology» more  CRYPTO 2003»
14 years 21 days ago
Fast Algebraic Attacks on Stream Ciphers with Linear Feedback
Many popular stream ciphers apply a filter/combiner to the state of one or several LFSRs. Algebraic attacks on such ciphers [10, 11] are possible, if there is a multivariate relat...
Nicolas Courtois