Sciweavers

318 search results - page 44 / 64
» A New Family of Authentication Protocols
Sort
View
ISCAS
2003
IEEE
114views Hardware» more  ISCAS 2003»
14 years 28 days ago
On the hardware implementations of the SHA-2 (256, 384, 512) hash functions
Couple to the communications wired and unwired networks growth, is the increasing demand for strong secure data transmission. New cryptographic standards are developed, and new en...
Nicolas Sklavos, Odysseas G. Koufopavlou
TMC
2010
250views more  TMC 2010»
13 years 6 months ago
Duty Cycle Control for Low-Power-Listening MAC Protocols
Energy efficiency is of the utmost importance in wireless sensor networks. The family of low-power-listening MAC protocols was proposed to reduce one form of energy dissipation...
Christophe J. Merlin, Wendi Beth Heinzelman
CORR
2006
Springer
95views Education» more  CORR 2006»
13 years 7 months ago
The computational power of population protocols
We consider the model of population protocols introduced by Angluin et al. [AAD+ 04], in which anonymous finite-state agents stably compute a predicate of the multiset of their in...
Dana Angluin, James Aspnes, David Eisenstat, Eric ...
WWW
2005
ACM
14 years 8 months ago
An abuse-free fair contract signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
TIFS
2010
186views more  TIFS 2010»
13 years 6 months ago
An abuse-free fair contract-signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang