Sciweavers

ICISC
2009
146views Cryptology» more  ICISC 2009»
13 years 10 months ago
First CPIR Protocol with Data-Dependent Computation
We design a new (n, 1)-CPIR protocol BddCpir for -bit strings as a combination of a noncryptographic (BDD-based) data structure and a more basic cryptographic primitive (communicat...
Helger Lipmaa
WCNC
2010
IEEE
14 years 4 months ago
Quantifying the Overhead Due to Routing Probes in Multi-Rate WMNs
—The selection of high-throughput routes is a key element towards improving the performance of wireless multihop networks. While several routing metrics have been proposed in the...
Ioannis Broustis, Konstantinos Pelechrinis, Dimitr...
ICALP
2009
Springer
15 years 22 days ago
Online Computation with Advice
Adi Rosén, Amos Korman, Pierre Fraigniaud, ...