Sciweavers

2265 search results - page 88 / 453
» Recovering Exchanged Data
Sort
View
110
Voted
INFOCOM
2010
IEEE
15 years 25 days ago
Castor: Scalable Secure Routing for Ad Hoc Networks
—Wireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have b...
Wojciech Galuba, Panos Papadimitratos, Marcin Potu...
108
Voted
INFOCOM
2010
IEEE
15 years 25 days ago
Evaluating Potential Routing Diversity for Internet Failure Recovery
—As the Internet becomes a critical infrastructure component of our global information-based society, any interruption to its availability can have significant economical and so...
Chengchen Hu, Kai Chen, Yan Chen, Bin Liu
110
Voted
CORR
2011
Springer
204views Education» more  CORR 2011»
14 years 6 months ago
Decentralized Supply Chain Formation: A Market Protocol and Competitive Equilibrium Analysis
Supply chain formation is the process of determining the structure and terms of exchange relationships to enable a multilevel, multiagent production activity. We present a simple ...
William E. Walsh, Michael P. Wellman
EUROCRYPT
2011
Springer
14 years 5 months ago
Semi-homomorphic Encryption and Multiparty Computation
An additively-homomorphic encryption scheme enables us to compute linear functions of an encrypted input by manipulating only the ciphertexts. We define the relaxed notion of a se...
Rikke Bendlin, Ivan Damgård, Claudio Orlandi...
ESORICS
2011
Springer
14 years 2 months ago
Remote Timing Attacks Are Still Practical
For over two decades, timing attacks have been an active area of research within applied cryptography. These attacks exploit cryptosystem or protocol implementations that do not ru...
Billy Bob Brumley, Nicola Tuveri