Sciweavers

450 search results - page 29 / 90
» Reliable Communication over Partially Authenticated Networks
Sort
View
TRIDENTCOM
2006
IEEE
14 years 1 months ago
A reliable optimization on distributed mutual exclusion algorithm
– This paper presents a reliable decentralized mutual exclusion algorithm for distributed systems in which processes communicate by asynchronous message passing. When any failure...
Moharram Challenger, Peyman Bayat, Mohammad Reza M...
INFOCOM
2007
IEEE
14 years 2 months ago
Analysis of the Reliability of a Nationwide Short Message Service
—SMS has been arguably the most popular wireless data service for cellular networks. Due to its ubiquitous availability and universal support by mobile handsets and cellular carr...
Xiaoqiao Meng, Petros Zerfos, Vidyut Samanta, Star...
CORR
2010
Springer
110views Education» more  CORR 2010»
13 years 8 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya
CRYPTO
2005
Springer
125views Cryptology» more  CRYPTO 2005»
14 years 1 months ago
Secure Computation Without Authentication
In the setting of secure multiparty computation, a set of parties wish to jointly compute some function of their inputs. Such a computation must preserve certain security propertie...
Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pa...
MOBIHOC
2006
ACM
14 years 7 months ago
Algorithmic aspects of communication in ad-hoc networks with smart antennas
Smart antennas have gained significant importance in multihop wireless networks in recent years, because of their sophisticated signal processing capabilities that hold the potent...
Karthikeyan Sundaresan, Weizhao Wang, Stephan Eide...