Sciweavers

764 search results - page 85 / 153
» Reputable Mix Networks
Sort
View
ITC
2003
IEEE
157views Hardware» more  ITC 2003»
15 years 7 months ago
Parity-Based Concurrent Error Detection in Symmetric Block Ciphers
Deliberate injection of faults into cryptographic devices is an effective cryptanalysis technique against symmetric and asymmetric encryption. We will describe a general concurren...
Ramesh Karri, Grigori Kuznetsov, Michael Göss...
DSN
2007
IEEE
15 years 8 months ago
Scaling and Continuous Availability in Database Server Clusters through Multiversion Replication
In this paper, we study replication techniques for scaling and continuous operation for a dynamic content server. Our focus is on supporting transparent and fast reconfiguration ...
Kaloian Manassiev, Cristiana Amza
LCN
1999
IEEE
15 years 6 months ago
Time Series Models for Internet Data Traffic
A statistical analysis of Internet traffic measurements from a campus site is carried out to examine the influence of the constituent protocols and applications on the characteris...
Chun You, Kavitha Chandra
IJISEC
2007
87views more  IJISEC 2007»
15 years 2 months ago
Breaking four mix-related schemes based on Universal Re-encryption
Universal Re-encryption allows El-Gamal ciphertexts to be re-encrypted without knowledge of their corresponding public keys. This has made it an enticing building block for anonymo...
George Danezis
VTC
2010
IEEE
175views Communications» more  VTC 2010»
15 years 14 days ago
Sensitivity Analysis of the Optimal Parameter Settings of an LTE Packet Scheduler
—Advanced packet scheduling schemes in 3G/3G+ mobile networks provide one or more parameters to optimise the trade-off between QoS and resource efficiency. In this paper we stud...
I. Fernandez Diaz, Desislava C. Dimitrova, Kathlee...