Sciweavers

146 search results - page 11 / 30
» Private Quantum Channels
Sort
View
FC
2006
Springer
94views Cryptology» more  FC 2006»
13 years 11 months ago
Private Policy Negotiation
With the increasing importance of correctly handling privacy-sensitive data, significant work has been put in expressing and enforcing privacy policies. Less work has been done ho...
Klaus Kursawe, Gregory Neven, Pim Tuyls
DC
2007
13 years 8 months ago
On private computation in incomplete networks
Suppose that some parties are connected by an incomplete network of reliable and private channels. The parties cooperate to execute some protocol. However, the parties are curious...
Amos Beimel
INFOCOM
2002
IEEE
14 years 27 days ago
Restoration Algorithms for Virtual Private Networks in the Hose Model
—A Virtual Private Network (VPN) aims to emulate the services provided by a private network over the shared Internet. The endpoints of e connected using abstractions such as Virt...
Giuseppe F. Italiano, Rajeev Rastogi, Bülent ...
ICC
2007
IEEE
105views Communications» more  ICC 2007»
14 years 2 months ago
Lower Bounds on the Capacity Regions of the Relay Channel and the Cooperative Relay-Broadcast Channel with Non-Causal Side Infor
— In this work, coding for the relay channel (RC) and the cooperative relay broadcast channel (RBC) controlled by random parameters are studied. In the first channel, the RC, in...
Abdellatif Zaidi, Luc Vandendorpe, Pierre Duhamel
CRYPTO
2007
Springer
145views Cryptology» more  CRYPTO 2007»
13 years 12 months ago
Secure Identification and QKD in the Bounded-Quantum-Storage Model
We consider the problem of secure identification: user U proves to server S that he knows an agreed (possibly low-entropy) password w, while giving away as little information on w ...
Ivan Damgård, Serge Fehr, Louis Salvail, Chr...