Stream computing, also known as data stream processing, has emerged as a new processing paradigm that processes incoming data streams from tremendous numbers of sensors in a real-time fashion. Data stream applications must have low latency even when the incoming data rate fluctuates wildly. This is almost impossible with a ...Download Now
Privacy amplification is a technique to distill a secret key from a random variable by a function so that the distilled key and eavesdropper's random variable are statistically independent. There are three kinds of security criteria for the key distilled by privacy amplification: the normalized divergence criterion, which is also ...Download Now
Roughly speaking, an encryption scheme is said to be non-malleable, if no adversary can modify a ciphertext so that the resulting message is meaningfully related to the original message. The authors compare this notion of security to secrecy and authenticity, and provide a complete characterization of their relative strengths. In ...Download Now
In today's aggressive and competitive marketplace, there is substantial need for corporations to incorporate Service Level Agreement (SLA) in their enterprise; and keep user differentiation with respect to information volume, response time, or system availability; to make their business more idiosyncratic. Faded Information Field (FIF) was proposed to deal assurance ...Download Now
Submit Your Content
Get your content listed in our directory for free!
Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?