Sciweavers

1256 search results - page 19 / 252
» A Simple E-Voting Protocol
Sort
View
SRDS
2006
IEEE
14 years 1 months ago
Improvements and Reconsideration of Distributed Snapshot Protocols
Distributed snapshots are an important building block for distributed systems, and, among other applications, are useful for constructing efficient checkpointing protocols. In ad...
Adnan Agbaria
IEEEIAS
2007
IEEE
14 years 1 months ago
Modeling Security Protocols as Games
We model security protocols as a game tree using concepts of game semantics. The model interprets protocol specifications as strategies over a game tree that represents the type ...
Mohamed Saleh, Mourad Debbabi
MASCOTS
2008
13 years 8 months ago
Taxis: Scalable Strong Anonymous Communication
Anonymity protocols are a privacy-enhancing technology for Internet-based communication. Two important characteristics of anonymity protocols are the strength of anonymity provide...
Andreas Hirt, Michael J. Jacobson Jr., Carey L. Wi...
TWC
2008
83views more  TWC 2008»
13 years 7 months ago
Opportunistic cooperative diversity with feedback and cheap radios
Practical cooperative diversity protocols often rely on low-cost radios that treat multiple in-band signals as noise and thus require strictly orthogonal transmissions. We analyze ...
Aggelos Bletsas, Ashish Khisti, Moe Z. Win
CN
2007
149views more  CN 2007»
13 years 7 months ago
Adaptive congestion protocol: A congestion control protocol with learning capability
There is strong evidence that the current implementation of TCP will perform poorly in future high speed networks. To address this problem many congestion control protocols have b...
Marios Lestas, Andreas Pitsillides, Petros A. Ioan...