Sciweavers

2673 search results - page 419 / 535
» Secure Communication: A New Application for Active Networks
Sort
View
EUROCRYPT
2000
Springer
14 years 25 days ago
Computing Inverses over a Shared Secret Modulus
We discuss the following problem: Given an integer shared secretly among n players and a prime number e, how can the players efficiently compute a sharing of e-1 mod . The most in...
Dario Catalano, Rosario Gennaro, Shai Halevi
TRUSTBUS
2010
Springer
13 years 7 months ago
Privacy Policy Referencing
Data protection legislation was originally defined for a context where personal information is mostly stored on centralized servers with limited connectivity or openness to 3rd pa...
Audun Jøsang, Lothar Fritsch, Tobias Mahler
GLOBECOM
2008
IEEE
13 years 10 months ago
Outage Behavior of Cooperative Diversity with Relay Selection
Abstract—Cooperative diversity is a useful technique to increase reliability and throughput of wireless networks. To analyze the performance gain from cooperative diversity, outa...
Kampol Woradit, Tony Q. S. Quek, Watcharapan Suwan...
SIGCOMM
2010
ACM
13 years 9 months ago
Improving peer-to-peer file distribution: winner doesn't have to take all
Recent work on BitTorrent has shown that the choke/unchoke mechanism implements an auction where each peer tries to induce other peers into "unchoking" it by uploading m...
Ben Leong, Youming Wang, Su Wen, Cristina Carbunar...
CCR
2010
184views more  CCR 2010»
13 years 9 months ago
Characterising temporal distance and reachability in mobile and online social networks
The analysis of social and technological networks has attracted a lot of attention as social networking applications and mobile sensing devices have given us a wealth of real data...
John Tang, Mirco Musolesi, Cecilia Mascolo, Vito L...