Sciweavers

525 search results - page 16 / 105
» A Fair e-Tendering Protocol
Sort
View
EUROCRYPT
2010
Springer
14 years 1 months ago
Partial Fairness in Secure Two-Party Computation
A seminal result of Cleve (STOC ’86) is that, in general, complete fairness is impossible to achieve in two-party computation. In light of this, various techniques for obtaining...
S. Dov Gordon, Jonathan Katz
AINA
2006
IEEE
14 years 2 months ago
Property-Based Taming of Lying Mobile Nodes
Intelligent security protocols can verify whether the involved principals have properties that are defined based on certain functional and security policies. The property we focu...
Mark Manulis, Ahmad-Reza Sadeghi
ICNP
2006
IEEE
14 years 2 months ago
The Delicate Tradeoffs in BitTorrent-like File Sharing Protocol Design
— The BitTorrent (BT) file sharing protocol is popular due to its scalability property and the incentive mechanism to reduce free-riding. However, in designing such P2P file sh...
Bin Fan, Dah-Ming Chiu, John C. S. Lui
AINA
2009
IEEE
14 years 3 months ago
A Topology Control Protocol for 2D Poisson Distributed Wireless Sensor Networks
—Topology control in a wireless sensor network is useful for ensuring that the network remains connected in the presence of nodes that exhaust their energy or become altogether d...
Waltenegus Dargie, Alexander Schill, Rami Mochaour...
ICC
2007
IEEE
246views Communications» more  ICC 2007»
14 years 3 months ago
AR-TP: An Adaptive and Responsive Transport Protocol for Wireless Mesh Networks
Abstract—Wireless meshing has been envisioned as the economically viable networking paradigm to build up broadband and large-scale wireless commodity networks. Several different ...
Vehbi Cagri Gungor, Pasquale Pace, Enrico Natalizi...