Sciweavers

749 search results - page 94 / 150
» Scenario based Analysis of Linear Computations
Sort
View
140
Voted
PET
2007
Springer
15 years 9 months ago
Anonymity in the Wild: Mixes on Unstructured Networks
Abstract. As decentralized computing scenarios get ever more popular, unstructured topologies are natural candidates to consider running mix networks upon. We consider mix network ...
Shishir Nagaraja
125
Voted
DSN
2005
IEEE
15 years 9 months ago
On Partial Protection in Groomed Optical WDM Mesh Networks
In this paper, we consider the problem of survivable network design in traffic groomed optical WDM mesh networks with sub-wavelength capacity connections. In typical survivable n...
Jing Fang, Mahesh Sivakumar, Arun K. Somani, Krish...
118
Voted
PERCOM
2008
ACM
16 years 3 months ago
A tamper-proof and lightweight authentication scheme
We present a tamper-proof and lightweight challenge-response authentication scheme based on 2-level noisy Physically Unclonable Functions (PUF). We present a security reduction, w...
Ghaith Hammouri, Erdinç Öztürk, Berk Sunar
117
Voted
IJNSEC
2007
128views more  IJNSEC 2007»
15 years 3 months ago
LFSR-based Signatures with Message Recovery
In order to reduce key sizes and bandwidth, several LFSRbased (linear feedback shift register) public key cryptosystems and signature schemes have been proposed. Digital signature...
Xiangxue Li, Dong Zheng, Kefei Chen
145
Voted
AINA
2009
IEEE
15 years 10 months ago
Content-Adaptive Robust H.264/SVC Video Communications over 802.11e Networks
In this paper we present a low-complexity traffic prioritization strategy for video transmission using the H.264 scalable video coding (SVC) standard over 802.11e wireless networ...
Dario Gallucci, Attilio Fiandrotti, Enrico Masala,...