Sciweavers

347 search results - page 26 / 70
» On private computation in incomplete networks
Sort
View
TCC
2005
Springer
88views Cryptology» more  TCC 2005»
14 years 1 months ago
Relaxing Environmental Security: Monitored Functionalities and Client-Server Computation
Definition of security under the framework of Environmental Security (a.k.a Network-Aware Security or Universally Composable Security) typically requires “extractability” of t...
Manoj Prabhakaran, Amit Sahai
LCN
2002
IEEE
14 years 18 days ago
Global Mobile IPv6 Addressing Using Transition Mechanisms
The adoption of the IPv4 protocol in wireless technologies has considerably increased the number of hosts that can potentially access the global Internet. The pressure for more IP...
Edgard Jamhour, Simone Storoz
AINA
2008
IEEE
14 years 2 months ago
A Proposed Scheme for Epidemic Routing with Active Curing for Opportunistic Networks
Opportunistic networking is emerging as a technique to exploit chance encounters among mobile nodes, and is distinct from previously studied behaviors found in sensor and ad hoc n...
Jonah P. Tower, Thomas D. C. Little
ACSAC
2000
IEEE
14 years 3 days ago
Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking
We present a vision of computing environments in which enterprise networks are built using untrusted public infrastructures. The vision allows for networks to dynamically change d...
Germano Caronni, S. Kumar, Christoph L. Schuba, Gl...
ICCAD
2000
IEEE
113views Hardware» more  ICCAD 2000»
14 years 3 days ago
Don't Cares and Multi-Valued Logic Network Minimization
We address optimizing multi-valued (MV) logic functions in a multi-level combinational logic network. Each node in the network, called an MV-node, has multi-valued inputs and sing...
Yunjian Jiang, Robert K. Brayton