Sciweavers

89 search results - page 17 / 18
» Password-authenticated Key Exchange using Efficient MACs
Sort
View
CRYPTO
2006
Springer
159views Cryptology» more  CRYPTO 2006»
13 years 10 months ago
Asymptotically Optimal Two-Round Perfectly Secure Message Transmission
Abstract. The problem of perfectly secure message transmission concerns two synchronized non-faulty processors sender (S) and receiver (R) that are connected by a synchronous netwo...
Saurabh Agarwal, Ronald Cramer, Robbert de Haan
CIIT
2004
111views Communications» more  CIIT 2004»
13 years 8 months ago
Scalable ant-based routing algorithm for ad-hoc networks
Ants-based routing algorithms have attracted the attention of researchers because they are more robust, reliable, and scalable than other conventional routing algorithms. Since th...
Yoshitaka Ohtaki, Naoki Wakamiya, Masayuki Murata,...
JCAM
2010
111views more  JCAM 2010»
13 years 1 months ago
Finite element simulation of compressible particle-laden gas flows
A macroscopic two-fluid model of compressible particle-laden gas flows is considered. The governing equations are discretized by a high-resolution finite element method based on a...
Marcel Gurris, Dmitri Kuzmin, Stefan Turek
CCS
2009
ACM
14 years 7 months ago
Authenticated wireless roaming via tunnels: making mobile guests feel at home
In wireless roaming a mobile device obtains a service from some foreign network while being registered for the similar service at its own home network. However, recent proposals tr...
Mark Manulis, Damien Leroy, François Koeune...
STOC
2005
ACM
112views Algorithms» more  STOC 2005»
14 years 6 months ago
The complexity of agreement
A celebrated 1976 theorem of Aumann asserts that honest, rational Bayesian agents with common priors will never "agree to disagree": if their opinions about any topic ar...
Scott Aaronson