Sciweavers

1256 search results - page 31 / 252
» A Simple E-Voting Protocol
Sort
View
CSFW
1997
IEEE
13 years 11 months ago
Strategies against Replay Attacks
Abstract— Replay attacks on security protocols have been discussed for quite some time in the literature. However, the efforts to address these attacks have been largely incomple...
Tuomas Aura
CJ
2000
85views more  CJ 2000»
13 years 7 months ago
Arguments and Results
If an object oriented program is a collection of communicating objects, then the objects' protocols de ne the languages the program speaks. Unfortunately, protocols are di cu...
James Noble
ICCCN
2007
IEEE
14 years 1 months ago
Transport Protocols for Remote Programming of Network Robots within the context of Telelaboratories for Education: A Comparative
– Within the context of Tele-Laboratories for Education the use of the Internet as communication media permits any researcher/student to perform remote experiments in a simple an...
Raul Wirz, Raúl Marín, José M...
ESORICS
2007
Springer
14 years 1 months ago
Synthesizing Secure Protocols
Abstract. We propose a general transformation that maps a cryptographic protocol that is secure in an extremely weak sense (essentially in a model where no adversary is present) in...
Véronique Cortier, Bogdan Warinschi, Eugen ...
JCM
2006
129views more  JCM 2006»
13 years 7 months ago
T-ANT: A Nature-Inspired Data Gathering Protocol for Wireless Sensor Networks
There are many difficult challenges ahead in the design of an energy-efficient communication stack for wireless sensor networks. Due to the severe sensor node constraints, protocol...
S. Selvakennedy, Sukunesan Sinnappan, Yi Shang