Sciweavers

5891 search results - page 187 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
132
Voted
ICMCS
1994
IEEE
85views Multimedia» more  ICMCS 1994»
15 years 8 months ago
Synchronization of Temporal Constructs in Distributed Multimedia Systems with Controlled Accuracy
Abstract. Withthe inceptionof technology in communication networks suchasATM, it will be possible to run multimedia applications on future integrated networks. Synchronizationof th...
Sang Hyuk Son, Nipun Agarwal
125
Voted
CONCUR
2008
Springer
15 years 6 months ago
Modeling Computational Security in Long-Lived Systems
Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
149
Voted
WAIM
2004
Springer
15 years 10 months ago
A Low-Cost Checkpointing Scheme for Mobile Computing Systems
In distributed computing systems, processes in different hosts take checkpoints to survive failures. For mobile computing systems, due to certain new characteristics conventional d...
Guohui Li, Hongya Wang, Jixiong Chen
PKC
2010
Springer
150views Cryptology» more  PKC 2010»
15 years 8 months ago
Security of Encryption Schemes in Weakened Random Oracle Models
Liskov proposed several weakened versions of the random oracle model, called weakened random oracle models (WROMs), to capture the vulnerability of ideal compression functions, wh...
Akinori Kawachi, Akira Numayama, Keisuke Tanaka, K...
ICPP
2007
IEEE
15 years 11 months ago
FlexFetch: A History-Aware Scheme for I/O Energy Saving in Mobile Computing
Extension of battery lifetime has always been a major issue for mobile computing. While more and more data are involved in mobile computing, energy consumption caused by I/O opera...
Feng Chen, Song Jiang, Weisong Shi, Weikuan Yu