Sciweavers

1256 search results - page 205 / 252
» A Simple E-Voting Protocol
Sort
View
PKC
2000
Springer
120views Cryptology» more  PKC 2000»
14 years 1 months ago
Optimally Efficient Accountable Time-Stamping
Abstract. Efficient secure time-stamping schemes employ a 2-level approach in which the time-stamping service operates in rounds. We say that a time-stamping service is accountable...
Ahto Buldas, Helger Lipmaa, Berry Schoenmakers
RTCSA
2000
IEEE
14 years 1 months ago
Space efficient wait-free buffer sharing in multiprocessor real-time systems based on timing information
A space efficient wait-free algorithm for implementing a shared buffer for real-time multiprocessor systems is presented in this paper. The commonly used method to implement share...
Håkan Sundell, Philippas Tsigas
DCOSS
2010
Springer
14 years 1 months ago
Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks
A number of protocols have been proposed to date to defend against wormhole attacks in wireless networks by adopting synchronized clocks, positioning devices, or directional antenn...
Tassos Dimitriou, Thanassis Giannetsos
USENIX
2008
14 years 3 days ago
Experiences with Client-based Speculative Remote Display
We propose an approach to remote display systems in which the client predicts the screen update events that the server will send and applies them to the screen immediately, thus e...
John R. Lange, Peter A. Dinda, Samuel Rossoff
CONEXT
2005
ACM
13 years 11 months ago
TIE breaking: tunable interdomain egress selection
— The separation of intradomain and interdomain routing has been a key feature of the Internet’s routing architecture from the early days of the ARPAnet. However, the appropria...
Renata Teixeira, Timothy G. Griffin, Mauricio G. C...