Filters








2 Hits in 2.7 sec

Hedged Public-Key Encryption: How to Protect against Bad Randomness [chapter]

Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev, Hovav Shacham, Scott Yilek
2009 Lecture Notes in Computer Science  
In practice, randomness may be of poor quality for a variety of reasons, leading to failure of the schemes. Expecting the systems to improve is unrealistic.  ...  They achieve adaptive security by establishing and exploiting the anonymity of LTDFs which we believe is of independent interest  ...  Acknowledgements We thank the Asiacrypt 2009 reviewers for detailed and thoughtful comments. References  ... 
doi:10.1007/978-3-642-10366-7_14 fatcat:47pgejyfgzf6bf3svidhc3672i

Non-functional requirements in publish/subscribe systems [article]

Muhammad Adnan Tariq, Universität Stuttgart, Universität Stuttgart
2013
In addition, the second contribution focuses on minimizing the overall resource usage, i.e., bandwidth consumption and processing load on peers (publishers and subscribers), in a publish/subscribe system  ...  The first two contributions target overlay-level methods to provide efficient dissemination of events and quality of service. The third contribution, however [...]  ...  Acknowledgments First and foremost, thanks to Almighty Allah S.W.T. for endowing me the strength, the courage and the perseverance for achieving this milestone in life.  ... 
doi:10.18419/opus-3088 fatcat:v2b354dyjvasfhpw7t2oszld4y