261![How Many Packets Can We Encode? — An Analysis of Practical Wireless Network Coding Jilin Le, John C.S. Lui How Many Packets Can We Encode? — An Analysis of Practical Wireless Network Coding Jilin Le, John C.S. Lui](https://www.pdfsearch.io/img/63ebcdab31892f179bce0fea53738613.jpg) | Add to Reading ListSource URL: www.cs.cuhk.hkLanguage: English - Date: 2008-06-28 23:20:51
|
---|
262![1 On the Performance Bounds of Practical Wireless Network Coding Jilin Le∗ , John C.S. Lui∗ and Dah Ming Chiu+ The Chinese University of Hong Kong 1 On the Performance Bounds of Practical Wireless Network Coding Jilin Le∗ , John C.S. Lui∗ and Dah Ming Chiu+ The Chinese University of Hong Kong](https://www.pdfsearch.io/img/c7085344c46393fdc425416523d57777.jpg) | Add to Reading ListSource URL: www.cs.cuhk.hkLanguage: English - Date: 2009-12-22 01:23:54
|
---|
263![Discrete logarithms: Recent progress in small characteristic Antoine Joux CryptoExperts Chaire de Cryptologie de la Fondation de l’UPMC — LIP6 Discrete logarithms: Recent progress in small characteristic Antoine Joux CryptoExperts Chaire de Cryptologie de la Fondation de l’UPMC — LIP6](https://www.pdfsearch.io/img/87ba2e2bacdd8c78e0bfd0b440f6a9f9.jpg) | Add to Reading ListSource URL: www-fourier.ujf-grenoble.frLanguage: English - Date: 2014-03-31 03:20:36
|
---|
264![This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. TRANSACTION ON MOBILE COMPUTING, VOL. X, NO. X, AUGUST 2012 This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. TRANSACTION ON MOBILE COMPUTING, VOL. X, NO. X, AUGUST 2012](https://www.pdfsearch.io/img/17f9ea947f6a7486b9aeff2bd0d938ad.jpg) | Add to Reading ListSource URL: www.cs.cuhk.hkLanguage: English - Date: 2013-03-28 07:48:29
|
---|
265![On Detecting Malicious Behaviors in Interactive Networks: Algorithms and Analysis Yongkun Li, John C.S. Lui On Detecting Malicious Behaviors in Interactive Networks: Algorithms and Analysis Yongkun Li, John C.S. Lui](https://www.pdfsearch.io/img/3a02fb0233891e1a421a1c6b5b96b088.jpg) | Add to Reading ListSource URL: www.cs.cuhk.hkLanguage: English - Date: 2011-12-10 04:32:26
|
---|
266![Pairing-Based Onion Routing with Improved Forward Secrecy ANIKET KATE, GREG M. ZAVERUCHA, and IAN GOLDBERG University of Waterloo This article presents new protocols for onion routing anonymity networks. We define a pro Pairing-Based Onion Routing with Improved Forward Secrecy ANIKET KATE, GREG M. ZAVERUCHA, and IAN GOLDBERG University of Waterloo This article presents new protocols for onion routing anonymity networks. We define a pro](https://www.pdfsearch.io/img/120a77ffae5cc5463c212072567bbc5f.jpg) | Add to Reading ListSource URL: www.cypherpunks.caLanguage: English - Date: 2010-12-30 09:39:44
|
---|
267![WET ZZW CONSTRUCTION FOR STEGANOGRAPHY Tomáš Filler and Jessica Fridrich Department of ECE, SUNY Binghamton, NY, USA {tomas.filler, fridrich}@binghamton.edu ABSTRACT Wet paper codes are an essential tool for communicat WET ZZW CONSTRUCTION FOR STEGANOGRAPHY Tomáš Filler and Jessica Fridrich Department of ECE, SUNY Binghamton, NY, USA {tomas.filler, fridrich}@binghamton.edu ABSTRACT Wet paper codes are an essential tool for communicat](https://www.pdfsearch.io/img/86de1d8e8b4e0fd05ebdd474ddda7060.jpg) | Add to Reading ListSource URL: www.ws.binghamton.eduLanguage: English - Date: 2009-05-21 12:29:43
|
---|
268![Discrete logarithm in GFwith FFS Razvan Barbulescu, Cyril Bouvier, Jérémie Detrey, Pierrick Gaudry, Hamza Jeljeli, Emmanuel Thomé, Marion Videau, and Paul Zimmermann CARAMEL project-team, LORIA, INRIA / CNRS / Discrete logarithm in GFwith FFS Razvan Barbulescu, Cyril Bouvier, Jérémie Detrey, Pierrick Gaudry, Hamza Jeljeli, Emmanuel Thomé, Marion Videau, and Paul Zimmermann CARAMEL project-team, LORIA, INRIA / CNRS /](https://www.pdfsearch.io/img/abb02281d13b6c46ab924ba53fec500c.jpg) | Add to Reading ListSource URL: www.loria.frLanguage: English - Date: 2014-01-09 15:35:58
|
---|
269![1 On the Security and Efficiency of Content Distribution Via Network Coding Qiming Li∗ John C.S. Lui+ 1 On the Security and Efficiency of Content Distribution Via Network Coding Qiming Li∗ John C.S. Lui+](https://www.pdfsearch.io/img/dc6b903ddb427c41c634b295b49970c7.jpg) | Add to Reading ListSource URL: www.cs.cuhk.hkLanguage: English - Date: 2011-05-19 23:15:34
|
---|
270![Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks Yongkun Li John C.S. Lui Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks Yongkun Li John C.S. Lui](https://www.pdfsearch.io/img/958fa5626e120e818bc2129f138d0eee.jpg) | Add to Reading ListSource URL: www.cs.cuhk.hkLanguage: English - Date: 2011-05-06 01:09:23
|
---|