Sciweavers

174 search results - page 8 / 35
» Practically Perfect
Sort
View
TCOM
2010
91views more  TCOM 2010»
13 years 7 months ago
Robust Power Allocation Algorithms for Wireless Relay Networks
—Resource allocation promises significant benefits in wireless networks. In order to fully reap these benefits, it is important to design efficient resource allocation algori...
Tony Q. S. Quek, Moe Z. Win, Marco Chiani
HUMAN
2003
Springer
14 years 1 months ago
A Study on Monitoring and Protecting Computer System against Interception Threat
Perfect protection against all system threats is considered to be impossible. The problem of monitoring against the threats has been an issue in literature, but its progress has no...
Seongje Cho, Chulyean Chang, Joonmo Kim, Jongmoo C...
SACRYPT
2004
Springer
122views Cryptology» more  SACRYPT 2004»
14 years 1 months ago
Extending the Resynchronization Attack
Abstract. Synchronous stream ciphers need perfect synchronization between sender and receiver. In practice, this is ensured by a resync mechanism. Daemen et al. [10] first describ...
Frederik Armknecht, Joseph Lano, Bart Preneel
WWW
2006
ACM
14 years 9 months ago
Designing an architecture for delivering mobile information services to the rural developing world
Paper plays a crucial role in many developing world information practices. However, paper-based records are inefficient, error-prone and difficult to aggregate. Therefore we need ...
Tapan S. Parikh, Edward D. Lazowska
PKC
2010
Springer
119views Cryptology» more  PKC 2010»
13 years 10 months ago
Efficient Set Operations in the Presence of Malicious Adversaries
We revisit the problem of constructing efficient secure two-party protocols for the problems of setintersection and set-union, focusing on the model of malicious parties. Our main...
Carmit Hazay, Kobbi Nissim