Sciweavers

2265 search results - page 88 / 453
» Recovering Exchanged Data
Sort
View
INFOCOM
2010
IEEE
13 years 7 months ago
Castor: Scalable Secure Routing for Ad Hoc Networks
—Wireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have b...
Wojciech Galuba, Panos Papadimitratos, Marcin Potu...
INFOCOM
2010
IEEE
13 years 7 months ago
Evaluating Potential Routing Diversity for Internet Failure Recovery
—As the Internet becomes a critical infrastructure component of our global information-based society, any interruption to its availability can have significant economical and so...
Chengchen Hu, Kai Chen, Yan Chen, Bin Liu
CORR
2011
Springer
204views Education» more  CORR 2011»
13 years 17 days ago
Decentralized Supply Chain Formation: A Market Protocol and Competitive Equilibrium Analysis
Supply chain formation is the process of determining the structure and terms of exchange relationships to enable a multilevel, multiagent production activity. We present a simple ...
William E. Walsh, Michael P. Wellman
EUROCRYPT
2011
Springer
13 years 8 days ago
Semi-homomorphic Encryption and Multiparty Computation
An additively-homomorphic encryption scheme enables us to compute linear functions of an encrypted input by manipulating only the ciphertexts. We define the relaxed notion of a se...
Rikke Bendlin, Ivan Damgård, Claudio Orlandi...
ESORICS
2011
Springer
12 years 8 months ago
Remote Timing Attacks Are Still Practical
For over two decades, timing attacks have been an active area of research within applied cryptography. These attacks exploit cryptosystem or protocol implementations that do not ru...
Billy Bob Brumley, Nicola Tuveri