Sciweavers

598 search results - page 24 / 120
» A fair certification protocol
Sort
View
TCC
2009
Springer
131views Cryptology» more  TCC 2009»
14 years 10 months ago
Complete Fairness in Multi-party Computation without an Honest Majority
Gordon et al. recently showed that certain (non-trivial) functions can be computed with complete fairness in the two-party setting. Motivated by their results, we initiate a study...
S. Dov Gordon, Jonathan Katz
COMPSAC
2005
IEEE
14 years 3 months ago
A Comparison of Network Level Fault Injection with Code Insertion
This paper describes our research into the application of fault injection to Simple Object Access Protocol (SOAP) based Service Oriented-Architectures (SOA). We show that our prev...
Nik Looker, Malcolm Munro, Jie Xu
PKC
2007
Springer
111views Cryptology» more  PKC 2007»
14 years 4 months ago
Optimistic Fair Exchange in a Multi-user Setting
: This paper addresses the security of optimistic fair exchange in a multi-user setting. While the security of public key encryption and public key signature schemes in a single-us...
Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum
PODC
2006
ACM
14 years 3 months ago
Adversarial queuing on the multiple-access channel
We consider deterministic distributed broadcasting on multiple access channels in the framework of adversarial queuing. Packets are injected dynamically by an adversary that is co...
Bogdan S. Chlebus, Dariusz R. Kowalski, Mariusz A....
ISCC
2003
IEEE
113views Communications» more  ISCC 2003»
14 years 3 months ago
Channel Sharing of Competing Flows in Ad Hoc Networks
This paper studies the fairness with which competing flows share the channel in ad hoc networks using collision avoidance protocols. It is shown that the required multihop coordi...
Yu Wang, J. J. Garcia-Luna-Aceves