Sciweavers

899 search results - page 12 / 180
» On Wiretap Networks II
Sort
View
EUROCRYPT
2008
Springer
13 years 9 months ago
Almost-Everywhere Secure Computation
Secure multi-party computation (MPC) is a central problem in cryptography. Unfortunately, it is well known that MPC is possible if and only if the underlying communication network...
Juan A. Garay, Rafail Ostrovsky
IIS
2000
13 years 9 months ago
Applying Data Mining Methods for Cellular Radio Network Planning
: This paper contains description of an knowledge discovery experiment performed in radio planning department of one of Polish celular telecom providers. The results of using vario...
Piotr Gawrysiak, Michal Okoniewski
NETWORKING
2007
13 years 9 months ago
The TCP Minimum RTO Revisited
We re-examine the two reasons for the conservative 1-second Minimum TCP-RTO to protect against spurious timeouts: i) the OS clock granularity and ii) the Delayed ACKs. We find tha...
Ioannis Psaras, Vassilis Tsaoussidis

Lecture Notes
401views
15 years 5 months ago
Introduction to Computer Networking
The lecture notes cover the following topics, Course Overview , Data Communications and Networking Overview , Data Transmission , Transmission Media , Signal Encoding Techniques ...
Raj Jain
FPL
2005
Springer
172views Hardware» more  FPL 2005»
14 years 1 months ago
An FPGA Network Architecture for Accelerating 3DES - CBC
This paper presents a DES/3DES core that will support Cipher Block Chaining (CBC) and also has a built in keygen that together take up about 10% of the resources in a Xilinx Virte...
Chin Mun Wee, Peter R. Sutton, Neil W. Bergmann