Sciweavers

796 search results - page 139 / 160
» The Anonymous Subgraph Problem
Sort
View
WINE
2005
Springer
123views Economy» more  WINE 2005»
14 years 1 months ago
An Adaptive Group-Based Reputation System in Peer-to-Peer Networks
Abstract. As more and more P2P applications being popular in Internet, one of important problem to be solved is inspiring users to cooperate each other actively and honestly, the r...
Liang Sun, Li Jiao, Yufeng Wang, Shiduan Cheng, We...
ASIACRYPT
2001
Springer
14 years 1 months ago
How to Leak a Secret
In this paper we formalize the notion of a ring signature, which makes it possible to specify a set of possible signers without revealing which member actually produced the signatu...
Ronald L. Rivest, Adi Shamir, Yael Tauman
EUROCRYPT
1999
Springer
14 years 23 days ago
Conditional Oblivious Transfer and Timed-Release Encryption
Abstract. We consider the problem of sending messages into the future." Previous constructions for this task were either based on heuristic assumptions or did not provide anon...
Giovanni Di Crescenzo, Rafail Ostrovsky, Sivaramak...
PKC
1999
Springer
86views Cryptology» more  PKC 1999»
14 years 22 days ago
Preserving Privacy in Distributed Delegation with Fast Certificates
Abstract. In a distributed system, dynamically dividing execution between nodes is essential for service robustness. However, when all of the nodes cannot be equally trusted, and w...
Pekka Nikander, Yki Kortesniemi, Jonna Partanen
PODC
2010
ACM
14 years 11 days ago
Distributed algorithms for edge dominating sets
An edge dominating set for a graph G is a set D of edges such that each edge of G is in D or adjacent to at least one edge in D. This work studies deterministic distributed approx...
Jukka Suomela