Sciweavers

525 search results - page 46 / 105
» Threshold Schemes with Disenrollment
Sort
View
EUROPKI
2004
Springer
14 years 3 months ago
Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography
The implementation of a standard PKI in a mobile ad hoc network (MANET) is not practical for several reasons: (1) lack of a fixed infrastructure; (2) a centralized certification au...
Charikleia Zouridaki, Brian L. Mark, Kris Gaj, Ros...
INFOCOM
2003
IEEE
14 years 3 months ago
Adaptive joint playout buffer and FEC adjustement for Internet Telephony
— We develop a joint playout buffer and Forward Error Correction (FEC) adjustment scheme for Internet Telephony, which incorporates the impact of end-to-end delay on the perceive...
Catherine Boutremans, Jean-Yves Le Boudec
CRYPTO
1994
Springer
116views Cryptology» more  CRYPTO 1994»
14 years 2 months ago
Tracing Traitors
We give cryptographic schemes that help trace the source of leaks when sensitive or proprietary data is made available to a large set of parties. A very relevant application is in ...
Benny Chor, Amos Fiat, Moni Naor
ISCI
2007
103views more  ISCI 2007»
13 years 10 months ago
Threshold-based declustering
Declustering techniques reduce query response time through parallel I/O by distributing data among multiple devices. Except for a few cases it is not possible to find declusterin...
Ali Saman Tosun
ETRICS
2006
14 years 1 months ago
Revocable Anonymity
Anonymity services in the EU may be forced by the new EU data retention directive to collect connection data and deanonymise some of their users in case of serious crimes. For this...
Stefan Köpsell, Rolf Wendolsky, Hannes Federr...