Sciweavers

1256 search results - page 30 / 252
» A Simple E-Voting Protocol
Sort
View
PERCOM
2007
ACM
14 years 7 months ago
A three round authenticated group key agreement protocol for ad hoc networks
Group Key Agreement (GKA) protocols enable the participants to derive a key based on each one's contribution over a public network without any central authority. They also pr...
Daniel Augot, Raghav Bhaskar, Valérie Issarny, Da...
WOWMOM
2005
ACM
138views Multimedia» more  WOWMOM 2005»
14 years 29 days ago
A Scenario-Based Performance Evaluation of Multicast Routing Protocols for Ad Hoc Networks
Current ad hoc multicast routing protocols have been designed to build and maintain a tree or mesh in the face of a mobile environment, with fast reaction to network changes in or...
Manoj Pandey, Daniel Zappala
ECBS
2010
IEEE
113views Hardware» more  ECBS 2010»
13 years 10 months ago
Do Sensornet Protocol Variants Yield Real Benefits?
Simple, stateless networking protocols provide a low-cost and predictable foundation upon which to build decentralised applications. Sensornets are complex, containing emergent be...
Jonathan Tate, Iain Bate
WASA
2009
Springer
127views Algorithms» more  WASA 2009»
14 years 2 months ago
Experimental Study on Secure Data Collection in Vehicular Sensor Networks
Abstract. In this paper, we show through a simple secure symmetric key based protocol design and its implementation the feasibility of secure data collection in a vehicular sensor ...
Harry Gao, Seth Utecht, Fengyuan Xu, Haodong Wang,...
LPAR
2005
Springer
14 years 27 days ago
Algebraic Intruder Deductions
Abstract. Many security protocols fundamentally depend on the algebraic properties of cryptographic operators. It is however difficult to handle these properties when formally anal...
David A. Basin, Sebastian Mödersheim, Luca Vi...