Sciweavers

915 search results - page 43 / 183
» Proof labeling schemes
Sort
View
ISCC
2003
IEEE
128views Communications» more  ISCC 2003»
14 years 1 months ago
A Load Balancing Scheme for Congestion Control in MPLS Networks
In this paper we develop a Load Balancing scheme for networks based on the MPLS framework. The proposed algorithm (DYLBA - Dynamic Load Balancing Algorithm) implements a local sea...
Elio Salvadori, Roberto Battiti
ICALP
2007
Springer
14 years 2 months ago
A Characterization of Non-interactive Instance-Dependent Commitment-Schemes (NIC)
Abstract. We provide a new characterization of certain zero-knowledge protocols as non-interactive instance-dependent commitment-schemes (NIC). To obtain this result we consider th...
Bruce M. Kapron, Lior Malka, Srinivasan Venkatesh
FFA
2006
116views more  FFA 2006»
13 years 8 months ago
Amorphic association schemes with negative Latin square-type graphs
Applying results from partial difference sets, quadratic forms, and recent results of Brouwer and Van Dam, we construct the first known amorphic association scheme with negative La...
James A. Davis, Qing Xiang
IH
2001
Springer
14 years 11 days ago
Zero-Knowledge Watermark Detection and Proof of Ownership
The goal of zero-knowledge watermark detection is to allow a prover to soundly convince a verifier of the presence of a watermark in certain stego-data without revealing any infor...
André Adelsbach, Ahmad-Reza Sadeghi
CRYPTO
2006
Springer
125views Cryptology» more  CRYPTO 2006»
13 years 11 months ago
Automated Security Proofs with Sequences of Games
This paper presents the first automatic technique for proving not only protocols but also primitives in the exact security computational model. Automatic proofs of cryptographic pr...
Bruno Blanchet, David Pointcheval