Sciweavers

1256 search results - page 34 / 252
» A Simple E-Voting Protocol
Sort
View
112
Voted
SODA
2008
ACM
108views Algorithms» more  SODA 2008»
15 years 2 months ago
Price based protocols for fair resource allocation: convergence time analysis and extension to Leontief utilities
We analyze several distributed, continuous time protocols for a fair allocation of bandwidths to flows in a network (or resources to agents). Our protocols converge to an allocati...
Ashish Goel, Hamid Nazerzadeh
105
Voted
PERCOM
2006
ACM
16 years 11 days ago
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
Security and privacy in RFID systems is an important and active research area. A number of challenges arise due to the extremely limited computational, storage and communication a...
Gene Tsudik
CSFW
2005
IEEE
15 years 6 months ago
An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols
Authentication and secrecy properties are proved by very different methods: the former by local reasoning, leading to matching knowledge of all principals about the order of their...
Iliano Cervesato, Catherine Meadows, Dusko Pavlovi...
96
Voted
AIME
2005
Springer
15 years 6 months ago
Testing Asbru Guidelines and Protocols for Neonatal Intensive Care
: The automatic application of computerized guidelines and protocols in intensive care is not simple, given the high volume of data which must be processed and the need to offer ad...
Christian Fuchsberger, Jim Hunter, Paul McCue
88
Voted
APPROX
2007
Springer
77views Algorithms» more  APPROX 2007»
15 years 7 months ago
High Entropy Random Selection Protocols
We study the two party problem of randomly selecting a string among all the strings of length n. We want the protocol to have the property that the output distribution has high en...
Harry Buhrman, Matthias Christandl, Michal Kouck&y...