Sciweavers

308 search results - page 12 / 62
» User's Functions in Standard Prolog
Sort
View
PKC
2012
Springer
279views Cryptology» more  PKC 2012»
11 years 9 months ago
Circular and KDM Security for Identity-Based Encryption
We initiate the study of security for key-dependent messages (KDM), sometimes also known as “circular” or “clique” security, in the setting of identity-based encryption (I...
Jacob Alperin-Sheriff, Chris Peikert
JSAC
2007
129views more  JSAC 2007»
13 years 7 months ago
Content-Aware Resource Allocation and Packet Scheduling for Video Transmission over Wireless Networks
— A cross-layer packet scheduling scheme that streams pre-encoded video over wireless downlink packet access networks to multiple users is presented. The scheme can be used with ...
Peshala V. Pahalawatta, Randall Berry, Thrasyvoulo...
EUROCRYPT
2011
Springer
12 years 11 months ago
Unbounded HIBE and Attribute-Based Encryption
In this work, we present HIBE and ABE schemes which are “unbounded” in the sense that the public parameters do not impose additional limitations on the functionality of the sy...
Allison B. Lewko, Brent Waters
CN
1999
106views more  CN 1999»
13 years 7 months ago
Impact of wireless access on traffic management in ATM networks
Traffic management plays an important role in providing differentiated quality of service to the users and to support the integration of a variety of broadband services within a c...
Rolf Sigle, Thomas Renger
IJCAI
2003
13 years 8 months ago
Incremental Utility Elicitation with the Minimax Regret Decision Criterion
Utility elicitation is a critical function of any automated decision aid, allowing decisions to be tailored to the preferences of a specific user. However, the size and complexit...
Tianhan Wang, Craig Boutilier