Sciweavers

796 search results - page 3 / 160
» The Anonymous Subgraph Problem
Sort
View
ICPP
2007
IEEE
14 years 1 months ago
Incentive-Driven P2P Anonymity System: A Game-Theoretic Approach
– Anonymous communication systems built on P2P infrastructures using anonymity forwarders are frequently affected by the churn problem, i.e. frequent joins and leaves of nodes. T...
Souvik Ray, Giora Slutzki, Zhao Zhang
DM
2002
114views more  DM 2002»
13 years 7 months ago
C4-saturated bipartite graphs
Let H be a graph. A graph G is said to be H-free if it contains no subgraph isomorphic to H. A graph G is said to be an H-saturated subgraph of a graph K if G is an H-free subgrap...
Darryn E. Bryant, Hung-Lin Fu
JUCS
2008
123views more  JUCS 2008»
13 years 7 months ago
Instruction Scheduling Based on Subgraph Isomorphism for a High Performance Computer Processor
: This paper1 presents an instruction scheduling algorithm based on the Subgraph Isomorphism Problem. Given a Directed Acyclic Graph (DAG) G1, our algorithm looks for a subgraph G2...
Ricardo Santos, Rodolfo Azevedo, Guido Araujo
TPDS
2008
231views more  TPDS 2008»
13 years 7 months ago
Anonymous Geo-Forwarding in MANETs through Location Cloaking
In this paper, we address the problem of destination anonymity for applications in mobile ad hoc networks where geographic information is ready for use in both ad hoc routing and I...
Xiaoxin Wu, Jun Liu, Xiaoyan Hong, Elisa Bertino
ASIACRYPT
2001
Springer
13 years 12 months ago
Key-Privacy in Public-Key Encryption
We consider a novel security requirement of encryption schemes that we call “key-privacy” or “anonymity”. It asks that an eavesdropper in possession of a ciphertext not be ...
Mihir Bellare, Alexandra Boldyreva, Anand Desai, D...