Sciweavers

764 search results - page 85 / 153
» Reputable Mix Networks
Sort
View
ITC
2003
IEEE
157views Hardware» more  ITC 2003»
14 years 1 months ago
Parity-Based Concurrent Error Detection in Symmetric Block Ciphers
Deliberate injection of faults into cryptographic devices is an effective cryptanalysis technique against symmetric and asymmetric encryption. We will describe a general concurren...
Ramesh Karri, Grigori Kuznetsov, Michael Göss...
DSN
2007
IEEE
14 years 2 months ago
Scaling and Continuous Availability in Database Server Clusters through Multiversion Replication
In this paper, we study replication techniques for scaling and continuous operation for a dynamic content server. Our focus is on supporting transparent and fast reconfiguration ...
Kaloian Manassiev, Cristiana Amza
LCN
1999
IEEE
14 years 3 days ago
Time Series Models for Internet Data Traffic
A statistical analysis of Internet traffic measurements from a campus site is carried out to examine the influence of the constituent protocols and applications on the characteris...
Chun You, Kavitha Chandra
IJISEC
2007
87views more  IJISEC 2007»
13 years 7 months ago
Breaking four mix-related schemes based on Universal Re-encryption
Universal Re-encryption allows El-Gamal ciphertexts to be re-encrypted without knowledge of their corresponding public keys. This has made it an enticing building block for anonymo...
George Danezis
VTC
2010
IEEE
175views Communications» more  VTC 2010»
13 years 6 months ago
Sensitivity Analysis of the Optimal Parameter Settings of an LTE Packet Scheduler
—Advanced packet scheduling schemes in 3G/3G+ mobile networks provide one or more parameters to optimise the trade-off between QoS and resource efficiency. In this paper we stud...
I. Fernandez Diaz, Desislava C. Dimitrova, Kathlee...