Sciweavers

87 search results - page 11 / 18
» Random Selection with an Adversarial Majority
Sort
View
ICNS
2009
IEEE
14 years 1 months ago
Counter-Flooding: DoS Protection for Public Key Handshakes in LANs
—The majority of security protocols employ public key cryptography for authentication at least in the connection setup phase. However, verifying digital signatures is an expensiv...
Yves Igor Jerschow, Björn Scheuermann, Martin...
EUROCRYPT
2009
Springer
14 years 7 months ago
Resettably Secure Computation
Abstract. The notion of resettable zero-knowledge (rZK) was introduced by Canetti, Goldreich, Goldwasser and Micali (FOCS'01) as a strengthening of the classical notion of zer...
Vipul Goyal, Amit Sahai
AINA
2007
IEEE
14 years 1 months ago
QoS-LI: QoS Loss Inference in Disadvantaged Networks
— Quality of Service (QoS) of disadvantaged networks is usually considered from a purely network standpoint in existing works. Adversarial intervention in such networks is not an...
Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya,...
PCM
2009
Springer
114views Multimedia» more  PCM 2009»
13 years 11 months ago
Improving a Digital Rights Management Scheme for Video Broadcast
The security of content distribution is a critical issue that all the content providers have to treat seriously in order to guarantee their business. Emmanuel and Kankanhalli propo...
Yongdong Wu, Feng Bao
RE
2002
Springer
13 years 6 months ago
Converging on the Optimal Attainment of Requirements
Planning for the optimal attainment of requirements is an important early lifecycle activity. However, such planning is difficult when dealing with competing requirements, limited...
Martin S. Feather, Tim Menzies