Sciweavers

1256 search results - page 29 / 252
» A Simple E-Voting Protocol
Sort
View
SIAMCOMP
2010
97views more  SIAMCOMP 2010»
13 years 5 months ago
Designing Network Protocols for Good Equilibria
Designing and deploying a network protocol determines the rules by which end users interact with each other and with the network. We consider the problem of designing a protocol t...
Ho-Lin Chen, Tim Roughgarden, Gregory Valiant
CSREASAM
2006
13 years 8 months ago
On Security in TCP/IP over Wireless Network
- The Transmission Control Protocol/Internet Protocol (TCP/IP) is combination of different protocols at various layers. TCP/IP is the basic communication language or protocol of th...
Shamila Makki, Wunnava V. Subbarao
WECWIS
2003
IEEE
85views ECommerce» more  WECWIS 2003»
14 years 20 days ago
Intermediary Non-repudiation Protocols
In commercial transactions, an intermediary might be involved to help transacting parties to conduct their business. Nevertheless, the intermediary may not be fully trusted. In th...
Jose Antonio Onieva, Jianying Zhou, Mildrey Carbon...
ESORICS
2003
Springer
14 years 19 days ago
An On-the-Fly Model-Checker for Security Protocol Analysis
We introduce the on-the-fly model-checker OFMC, a tool that combines two methods for analyzing security protocols. The first is the use of lazy data-types as a simple way of buil...
David A. Basin, Sebastian Mödersheim, Luca Vi...
IJNSEC
2006
122views more  IJNSEC 2006»
13 years 7 months ago
A Hash-based Strong Password Authentication Protocol with User Anonymity
Password authentication protocols range from complex public-key cryptosystems to simple hash-based password authentication schemes. One common feature of these protocols is that t...
Kumar V. Mangipudi, Rajendra S. Katti