Sciweavers

598 search results - page 52 / 120
» A fair certification protocol
Sort
View
ICOIN
2001
Springer
14 years 2 months ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae
ACNS
2003
Springer
193views Cryptology» more  ACNS 2003»
14 years 3 months ago
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem
Distributed key generation is one of the most challenging tasks for threshold cryptosystems. Designing such a protocol and proving its security against a malicious, adaptive adver...
Rui Zhang 0002, Hideki Imai
JSAC
2008
110views more  JSAC 2008»
13 years 10 months ago
Designing Multicast Protocols for Non-Cooperative Networks
Conventionally, most network protocols assume that the network entities who participate in the network activities will always behave as instructed. However, in practice, most netwo...
Weizhao Wang, Xiang-Yang Li, Yu Wang 0003, Zheng S...
MOBIHOC
2002
ACM
14 years 9 months ago
Characterizing the interaction between routing and MAC protocols in ad-hoc networks
We empirically study the effect of mobility and interaction between various input parameters on the performance of protocols designed for wireless ad-hoc networks. An important ob...
Christopher L. Barrett, Achla Marathe, Madhav V. M...
CCR
2000
78views more  CCR 2000»
13 years 9 months ago
Some guidelines for non-repudiation protocols
Non-repudiation protocols aim at preventing parties in a communication from falsely denying having taken part in that communication; for example, a non-repudiation protocol for di...
Panagiotis Louridas