Sciweavers

241 search results - page 24 / 49
» On Proactive Secret Sharing Schemes
Sort
View
NTMS
2009
IEEE
14 years 3 months ago
An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements
—New approaches that generate secret keys from radio channel characteristics have been recently proposed. The security of these schemes usually relies on the reciprocity principl...
Sana Tmar Ben Hamida, Jean-Benoît Pierrot, C...
ASIACRYPT
2000
Springer
14 years 1 months ago
Improved Methods to Perform Threshold RSA
Abstract. A t out of n threshold scheme is such that shares are distributed to n participants so that any set of t participants can compute the secret, whereas any set of less than...
Brian King
ICDE
2005
IEEE
86views Database» more  ICDE 2005»
14 years 10 months ago
Proactive Caching for Spatial Queries in Mobile Environments
Semantic caching enables mobile clients to answer spatial queries locally by storing the query descriptions together with the results. However, it supports only a limited number o...
Haibo Hu, Jianliang Xu, Wing Sing Wong, Baihua Zhe...
ICC
2007
IEEE
14 years 3 months ago
Overlay Partition: Iterative Detection and Proactive Recovery
— Overlay networks provide infrastructures for a large variety of Internet applications, like file sharing, online gaming, and multimedia streaming. However, these networks ofte...
Tongqing Qiu, Edward Chan, Guihai Chen
ISCAPDCS
2001
13 years 10 months ago
Evaluation of Proactive Congestion Control on RED Gateway
In this paper we investigate the network performance of TCP hosts and gateways employing New Reno TCP using a parallel simulator. The gateway adopts the random early detection (RE...
Kuoling Fang, Hee Yong Youn, Hyunseung Choo, Chans...