Sciweavers

224 search results - page 38 / 45
» Transformations between Cryptographic Protocols
Sort
View
ERCIMDL
2005
Springer
80views Education» more  ERCIMDL 2005»
14 years 3 months ago
Strategies for Reprocessing Aggregated Metadata
The OAI protocol facilitates the aggregation of large numbers of heterogeneous metadata records. In order to make harvested records useable in the context of an OAI service provide...
Muriel Foulonneau, Timothy W. Cole
IPSN
2011
Springer
13 years 1 months ago
Exploration of path space using sensor network geometry
In a sensor network there are many paths between a source and a destination. An efficient method to explore and navigate in the ‘path space’ can help many important routing p...
Ruirui Jiang, Xiaomeng Ban, Mayank Goswami, Wei Ze...
TCC
2007
Springer
104views Cryptology» more  TCC 2007»
14 years 3 months ago
Unifying Classical and Quantum Key Distillation
Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state ρABE. In addition, ...
Matthias Christandl, Artur Ekert, Michal Horodecki...
STOC
2001
ACM
129views Algorithms» more  STOC 2001»
14 years 10 months ago
Interaction in quantum communication and the complexity of set disjointness
One of the most intriguing facts about communication using quantum states is that these states cannot be used to transmit more classical bits than the number of qubits used, yet i...
Hartmut Klauck, Ashwin Nayak, Amnon Ta-Shma, David...
SAINT
2003
IEEE
14 years 3 months ago
Adapted Content Delivery for Different Contexts
In this paper, we present a framework which allows adapted content delivery for different target contexts. This framework is based on a Universal Profiling Schema UPS for describi...
Tayeb Lemlouma, Nabil Layaïda