Sciweavers

1256 search results - page 34 / 252
» A Simple E-Voting Protocol
Sort
View
SODA
2008
ACM
108views Algorithms» more  SODA 2008»
14 years 8 days ago
Price based protocols for fair resource allocation: convergence time analysis and extension to Leontief utilities
We analyze several distributed, continuous time protocols for a fair allocation of bandwidths to flows in a network (or resources to agents). Our protocols converge to an allocati...
Ashish Goel, Hamid Nazerzadeh
PERCOM
2006
ACM
14 years 10 months ago
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
Security and privacy in RFID systems is an important and active research area. A number of challenges arise due to the extremely limited computational, storage and communication a...
Gene Tsudik
CSFW
2005
IEEE
14 years 4 months ago
An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols
Authentication and secrecy properties are proved by very different methods: the former by local reasoning, leading to matching knowledge of all principals about the order of their...
Iliano Cervesato, Catherine Meadows, Dusko Pavlovi...
AIME
2005
Springer
14 years 4 months ago
Testing Asbru Guidelines and Protocols for Neonatal Intensive Care
: The automatic application of computerized guidelines and protocols in intensive care is not simple, given the high volume of data which must be processed and the need to offer ad...
Christian Fuchsberger, Jim Hunter, Paul McCue
APPROX
2007
Springer
77views Algorithms» more  APPROX 2007»
14 years 5 months ago
High Entropy Random Selection Protocols
We study the two party problem of randomly selecting a string among all the strings of length n. We want the protocol to have the property that the output distribution has high en...
Harry Buhrman, Matthias Christandl, Michal Kouck&y...