Sciweavers

525 search results - page 14 / 105
» Threshold Schemes with Disenrollment
Sort
View
FI
2011
96views more  FI 2011»
13 years 5 months ago
A Distributed Public Key Infrastructure Based on Threshold Cryptography for the HiiMap Next Generation Internet Architecture
: In this article, a security extension for the HiiMap Next Generation Internet Architecture is presented. We regard a public key infrastructure which is integrated into the mappin...
Oliver Hanka, Michael Eichhorn, Martin Pfannenstei...
ICCD
2002
IEEE
93views Hardware» more  ICCD 2002»
14 years 7 months ago
Impact of Scaling on the Effectiveness of Dynamic Power Reduction Schemes
Power is considered to be the major limiter to the design of more faster and complex processors in the near future. In order to address this challenge, a combination of process, c...
David Duarte, Narayanan Vijaykrishnan, Mary Jane I...
PODS
2004
ACM
148views Database» more  PODS 2004»
14 years 10 months ago
Deterministic Wavelet Thresholding for Maximum-Error Metrics
Several studies have demonstrated the effectiveness of the wavelet decomposition as a tool for reducing large amounts of data down to compact wavelet synopses that can be used to ...
Minos N. Garofalakis, Amit Kumar
TCC
2010
Springer
178views Cryptology» more  TCC 2010»
14 years 7 months ago
Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems
We present a variant of Regev’s cryptosystem first presented in [Reg05], but with a new choice of parameters. By a recent classical reduction by Peikert we prove the scheme sema...
Rikke Bendlin, Ivan Damgård
CORR
2007
Springer
126views Education» more  CORR 2007»
13 years 10 months ago
The effect of fading, channel inversion, and threshold scheduling on ad hoc networks
—This paper addresses three issues in the field of ad hoc network capacity: the impact of i) channel fading, ii) channel inversion power control, and iii) threshold–based sche...
Steven Weber, Jeffrey G. Andrews, Nihar Jindal