Sciweavers

648 search results - page 51 / 130
» The GCHQ Protocol and Its Problems
Sort
View
EUROCRYPT
2001
Springer
14 years 1 months ago
Priced Oblivious Transfer: How to Sell Digital Goods
Abstract. We consider the question of protecting the privacy of customers buying digital goods. More specifically, our goal is to allow a buyer to purchase digital goods from a ve...
William Aiello, Yuval Ishai, Omer Reingold
CCS
2008
ACM
13 years 10 months ago
Secure neighbor discovery in wireless networks: formal investigation of possibility
Wireless communication enables a broad spectrum of applications, ranging from commodity to tactical systems. Neighbor discovery (ND), that is, determining which devices are within...
Marcin Poturalski, Panos Papadimitratos, Jean-Pier...
DCC
2006
IEEE
14 years 8 months ago
Practical Low Delay Broadcast of Compressed Variable Bit Rate Movies
H.264 is currently the best way to compress media to achieve high quality at low bandwidth. Since its inception, technologies such as video-on-demand are increasingly realizable. ...
Neva Cherniavsky
IPTPS
2005
Springer
14 years 2 months ago
Conservation vs. Consensus in Peer-to-Peer Preservation Systems
— The problem of digital preservation is widely acknowledged, but the underlying assumptions implicit to the design of systems that address this problem have not been analyzed ex...
Prashanth P. Bungale, Geoffrey Goodell, Mema Rouss...
SODA
2008
ACM
108views Algorithms» more  SODA 2008»
13 years 10 months ago
Price based protocols for fair resource allocation: convergence time analysis and extension to Leontief utilities
We analyze several distributed, continuous time protocols for a fair allocation of bandwidths to flows in a network (or resources to agents). Our protocols converge to an allocati...
Ashish Goel, Hamid Nazerzadeh