Sciweavers

5891 search results - page 194 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
EUROCRYPT
2012
Springer
13 years 7 months ago
Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
This paper proposes the first inner product encryption (IPE) scheme that is adaptively secure and fully attribute-hiding (attribute-hiding in the sense of the definition by Katz...
Tatsuaki Okamoto, Katsuyuki Takashima
117
Voted
CN
2007
99views more  CN 2007»
15 years 4 months ago
Mistreatment-resilient distributed caching
The distributed partitioning of autonomous, self-aware nodes into cooperative groups, within which scarce resources could be effectively shared for the benefit of the group, is ...
Georgios Smaragdakis, Nikolaos Laoutaris, Azer Bes...
161
Voted
NPL
1998
133views more  NPL 1998»
15 years 4 months ago
Parallel Coarse Grain Computing of Boltzmann Machines
Abstract. The resolution of combinatorial optimization problems can greatly benefit from the parallel and distributed processing which is characteristic of neural network paradigm...
Julio Ortega, Ignacio Rojas, Antonio F. Día...
INFOCOM
2011
IEEE
14 years 8 months ago
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
—Recently, there has been great interest in physical layer security techniques that exploit the randomness of wireless channels for securely extracting cryptographic keys. Severa...
Qian Wang, Hai Su, Kui Ren, Kwangjo Kim
ICC
2007
IEEE
164views Communications» more  ICC 2007»
15 years 11 months ago
An Application-Driven Mobility Management Scheme for Hierarchical Mobile IPv6 Networks
— Mobile users are expected to be highly dynamic in next generation mobile networks. Additionally they will be served a wide variety of services with different transmission rates...
Tarik Taleb, Yuji Ikeda, Kazuo Hashimoto, Yoshiaki...