Wrocklage Intermedia GmbH

Displaying 1-7 of 7 results

  • White Papers // Nov 2013

    Stamp & Extend - Instant but Undeniable Timestamping Based on Lazy Trees

    The authors present a stamp & extend time-stamping scheme based on linking via modified creation of schnorr signatures. The scheme is based on lazy construction of a tree of signatures. Stamp & extend returns a timestamp immediately after the request, unlike the schemes based on the concept of time-stamping rounds....

    Provided By Wrocklage Intermedia GmbH

  • White Papers // Sep 2012

    Optimizing Segment Based Document Protection

    In this paper, the authors provide a corrected and generalized version of the scheme presented at SOFSEM'2012 in their paper "Optimizing Segment Based Document Protection" (SOFSEM 2012: Theory and Practice of Computer Science, LNCS 7147, pp. 566-575). They develop techniques for protecting documents with restricted access rights. In these documents...

    Provided By Wrocklage Intermedia GmbH

  • White Papers // Mar 2012

    Two-Phase Cardinality Estimation Protocols for Sensor Networks With Provable Precision

    Efficient cardinality estimation is a common requirement for many Wireless Sensor Network (WSN) applications. The task must be accomplished at extremely low overhead due to severe sensor resource limitation. This poses an interesting challenge for large-scale WSNs. In this paper, the authors present a two-phase probabilistic algorithm based on order...

    Provided By Wrocklage Intermedia GmbH

  • White Papers // Nov 2011

    Attack Against Ibrahim's Distributed Key Generation for RSA

    Distributed RSA key generation protocols aim to generate RSA keys in such a way that no single participant of the protocol can learn factorization of the RSA modulus. In this paper, the authors show that two recent protocols of this kind fail their security target. They present an attack that...

    Provided By Wrocklage Intermedia GmbH

  • White Papers // Sep 2011

    Resources Management and Services Personalization in Future Internet Applications

    The aim of this paper is to introduce a problem of e-health services quality management. The process of delivering e-health services to users consists of two major tasks: service personalization and resources allocation. In this paper, the authors introduce a use-cases of e-health system and distinguish services that can be...

    Provided By Wrocklage Intermedia GmbH

  • White Papers // Aug 2011

    RBO Protocol: Broadcasting Huge Databases for Tiny Receivers

    The authors propose a protocol (called RBO) for broadcasting long streams of single-packet messages over radio channel for tiny, battery powered, receivers. The messages are labeled by the keys from some linearly ordered set. The sender repeatedly broadcasts a sequence of many (possibly millions) of messages, while each receiver is...

    Provided By Wrocklage Intermedia GmbH

  • White Papers // Nov 2010

    Krylov Subspace Methods in Application to WCDMA Network Optimization

    Krylov subspace methods, which include, e.g. CG, CGS, Bi-CG, QMR or GMRES, are commonly applied as linear solvers for sparse large-scale linear least squares problems. In the paper, the authors discuss the usefulness of such methods to the optimization of WCDMA networks. They compare the selected methods with respect to...

    Provided By Wrocklage Intermedia GmbH

  • White Papers // Nov 2010

    Krylov Subspace Methods in Application to WCDMA Network Optimization

    Krylov subspace methods, which include, e.g. CG, CGS, Bi-CG, QMR or GMRES, are commonly applied as linear solvers for sparse large-scale linear least squares problems. In the paper, the authors discuss the usefulness of such methods to the optimization of WCDMA networks. They compare the selected methods with respect to...

    Provided By Wrocklage Intermedia GmbH

  • White Papers // Mar 2012

    Two-Phase Cardinality Estimation Protocols for Sensor Networks With Provable Precision

    Efficient cardinality estimation is a common requirement for many Wireless Sensor Network (WSN) applications. The task must be accomplished at extremely low overhead due to severe sensor resource limitation. This poses an interesting challenge for large-scale WSNs. In this paper, the authors present a two-phase probabilistic algorithm based on order...

    Provided By Wrocklage Intermedia GmbH

  • White Papers // Aug 2011

    RBO Protocol: Broadcasting Huge Databases for Tiny Receivers

    The authors propose a protocol (called RBO) for broadcasting long streams of single-packet messages over radio channel for tiny, battery powered, receivers. The messages are labeled by the keys from some linearly ordered set. The sender repeatedly broadcasts a sequence of many (possibly millions) of messages, while each receiver is...

    Provided By Wrocklage Intermedia GmbH

  • White Papers // Nov 2011

    Attack Against Ibrahim's Distributed Key Generation for RSA

    Distributed RSA key generation protocols aim to generate RSA keys in such a way that no single participant of the protocol can learn factorization of the RSA modulus. In this paper, the authors show that two recent protocols of this kind fail their security target. They present an attack that...

    Provided By Wrocklage Intermedia GmbH

  • White Papers // Sep 2012

    Optimizing Segment Based Document Protection

    In this paper, the authors provide a corrected and generalized version of the scheme presented at SOFSEM'2012 in their paper "Optimizing Segment Based Document Protection" (SOFSEM 2012: Theory and Practice of Computer Science, LNCS 7147, pp. 566-575). They develop techniques for protecting documents with restricted access rights. In these documents...

    Provided By Wrocklage Intermedia GmbH

  • White Papers // Sep 2011

    Resources Management and Services Personalization in Future Internet Applications

    The aim of this paper is to introduce a problem of e-health services quality management. The process of delivering e-health services to users consists of two major tasks: service personalization and resources allocation. In this paper, the authors introduce a use-cases of e-health system and distinguish services that can be...

    Provided By Wrocklage Intermedia GmbH

  • White Papers // Nov 2013

    Stamp & Extend - Instant but Undeniable Timestamping Based on Lazy Trees

    The authors present a stamp & extend time-stamping scheme based on linking via modified creation of schnorr signatures. The scheme is based on lazy construction of a tree of signatures. Stamp & extend returns a timestamp immediately after the request, unlike the schemes based on the concept of time-stamping rounds....

    Provided By Wrocklage Intermedia GmbH