Sciweavers

525 search results - page 12 / 105
» Threshold Schemes with Disenrollment
Sort
View
SIGMOD
2005
ACM
141views Database» more  SIGMOD 2005»
14 years 10 months ago
Fault-tolerance in the Borealis distributed stream processing system
We present a replication-based approach to fault-tolerant distributed stream processing in the face of node failures, network failures, and network partitions. Our approach aims t...
Magdalena Balazinska, Hari Balakrishnan, Samuel Ma...
EUROPKI
2004
Springer
14 years 3 months ago
Threshold Password-Based Authentication Using Bilinear Pairings
We present a new threshold password-based authentication protocol that allows a roaming user(a user who accesses a network from different client terminals) to download a private k...
Songwon Lee, Kyusuk Han, Seok-kyu Kang, Kwangjo Ki...
ISMVL
2000
IEEE
79views Hardware» more  ISMVL 2000»
14 years 2 months ago
Novel Resonant-Tunneling Multiple-Threshold Logic Circuit Based on Switching Sequence Detection
We present a novel multiple-threshold circuit using resonant-tunneling diodes (RTDs). The logic operation is based on detecting a switching sequence in the RTD circuit. This schem...
Takao Waho, Kazufumi Hattori, Kouji Honda
IACR
2011
196views more  IACR 2011»
12 years 9 months ago
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
Fully homomorphic encryption (FHE) provides a simple template for secure computation between two parties (Alice and Bob) where: (I) Alice encrypts her input under her key, (II) Bo...
Gilad Asharov, Abhishek Jain, Daniel Wichs
ITNG
2007
IEEE
14 years 4 months ago
THIS: THreshold security for Information aggregation in Sensor networks
Message aggregation can be used to reduce the communication overhead in a network where many messages have the “same” content. However, it may make the network less secure bec...
Hai Vu, Neeraj Mittal, Subbarayan Venkatesan