Sciweavers

743 search results - page 104 / 149
» Secure Signature Schemes based on Interactive Protocols
Sort
View
FC
2010
Springer
205views Cryptology» more  FC 2010»
13 years 11 months ago
On Robust Key Agreement Based on Public Key Authentication
—This paper discusses public-key authenticated key agreement protocols. First, we critically analyze several authenticated key agreement protocols and uncover various theoretical...
Feng Hao
ASIACRYPT
2008
Springer
13 years 9 months ago
Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes
Strongly multiplicative linear secret sharing schemes (LSSS) have been a powerful tool for constructing secure multi-party computation protocols. However, it remains open whether o...
Zhifang Zhang, Mulan Liu, Yeow Meng Chee, San Ling...
CN
2007
74views more  CN 2007»
13 years 7 months ago
SSVP: A congestion control scheme for real-time video streaming
In this paper, we present a new end-to-end protocol, namely Scalable Streaming Video Protocol (SSVP), which operates on top of UDP and is optimized for unicast video streaming app...
Panagiotis Papadimitriou, Vassilis Tsaoussidis
WWIC
2007
Springer
132views Communications» more  WWIC 2007»
14 years 1 months ago
A Quality Adaptation Scheme for Internet Video Streams
We propose a layered quality adaptation scheme for video streams to smooth the short-term oscillations induced by Additive Increase Multiplicative Decrease (AIMD) mechanisms, and e...
Panagiotis Papadimitriou, Vassilis Tsaoussidis
FC
2000
Springer
106views Cryptology» more  FC 2000»
13 years 11 months ago
Capability-Based Financial Instruments
Every novel cooperative arrangement of mutually suspicious parties interacting electronically -- every smart contract -- effectively requires a new cryptographic protocol. However,...
Mark S. Miller, Chip Morningstar, Bill Frantz