Sciweavers

49 search results - page 3 / 10
» Adaptation of TURN protocol to SIP protocol
Sort
View
NCA
2005
IEEE
14 years 1 months ago
Controlling the Coverage of Grid Information Dissemination Protocols
Grid information dissemination protocols distribute information about the dynamic state of computational resources throughout interconnected wide area Grids. Performance metrics f...
Bhavin Gandhi, Sameer Tilak, Michael J. Lewis, Nae...
STOC
1996
ACM
185views Algorithms» more  STOC 1996»
13 years 11 months ago
Adaptively Secure Multi-Party Computation
A fundamental problem in designing secure multi-party protocols is how to deal with adaptive adversaries i.e., adversaries that may choose the corrupted parties during the course ...
Ran Canetti, Uriel Feige, Oded Goldreich, Moni Nao...
TCC
2009
Springer
177views Cryptology» more  TCC 2009»
14 years 8 months ago
Composability and On-Line Deniability of Authentication
Abstract. Protocols for deniable authentication achieve seemingly paradoxical guarantees: upon completion of the protocol the receiver is convinced that the sender authenticated th...
Yevgeniy Dodis, Jonathan Katz, Adam Smith, Shabsi ...
WINET
2008
77views more  WINET 2008»
13 years 7 months ago
VE-mobicast: a variant-egg-based mobicast routing protocol for sensornets
In this paper, we present a new "spatiotemporal multicast", called a "mobicast", protocol for supporting applications which require spatiotemporal coordination...
Yuh-Shyan Chen, Shin-Yi Ann, Yun-Wei Lin
ASIACRYPT
2007
Springer
13 years 11 months ago
Simple and Efficient Perfectly-Secure Asynchronous MPC
Secure multi-party computation (MPC) allows a set of n players to securely compute an agreed function of their inputs, even when up to t players are under the control of an adversa...
Zuzana Beerliová-Trubíniová, ...