Sciweavers

198 search results - page 24 / 40
» The Multiplicative Quantum Adversary
Sort
View
WDAG
2007
Springer
102views Algorithms» more  WDAG 2007»
14 years 1 months ago
A Denial-of-Service Resistant DHT
We consider the problem of designing scalable and robust information systems based on multiple servers that can survive even massive denial-of-service (DoS) attacks. More precisely...
Baruch Awerbuch, Christian Scheideler
ASIACRYPT
2005
Springer
14 years 1 months ago
Parallel Multi-party Computation from Linear Multi-secret Sharing Schemes
Abstract. As an extension of multi-party computation (MPC), we propose the concept of secure parallel multi-party computation which is to securely compute multi-functions against a...
Zhifang Zhang, Mulan Liu, Liangliang Xiao
ISCC
2002
IEEE
147views Communications» more  ISCC 2002»
14 years 16 days ago
Self-securing ad hoc wireless networks
Mobile ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to secur...
Haiyun Luo, Petros Zerfos, Jiejun Kong, Songwu Lu,...
CTRSA
2001
Springer
120views Cryptology» more  CTRSA 2001»
14 years 3 days ago
Forward-Secure Threshold Signature Schemes
We consider the usage of forward security with threshold signature schemes. This means that even if more than the threshold number of players are compromised, some security remain...
Michel Abdalla, Sara K. Miner, Chanathip Namprempr...
INFORMATICASI
2010
13 years 4 months ago
Strategic Modeling of Information Sharing among Data Privacy Attackers
Research in privacy-preserving data publishing has revealed the necessity of accounting for an adversary's background knowledge when reasoning about the protection afforded b...
Quang Duong, Kristen LeFevre, Michael P. Wellman