Sciweavers

ICISC
2009
146views Cryptology» more  ICISC 2009»
14 years 26 days ago
First CPIR Protocol with Data-Dependent Computation
We design a new (n, 1)-CPIR protocol BddCpir for -bit strings as a combination of a noncryptographic (BDD-based) data structure and a more basic cryptographic primitive (communicat...
Helger Lipmaa
WCNC
2010
IEEE
14 years 7 months ago
Quantifying the Overhead Due to Routing Probes in Multi-Rate WMNs
—The selection of high-throughput routes is a key element towards improving the performance of wireless multihop networks. While several routing metrics have been proposed in the...
Ioannis Broustis, Konstantinos Pelechrinis, Dimitr...
ICALP
2009
Springer
15 years 3 months ago
Online Computation with Advice
Adi Rosén, Amos Korman, Pierre Fraigniaud, ...