Sciweavers

4305 search results - page 199 / 861
» Analysing Protocol Implementations
Sort
View
CORR
2010
Springer
159views Education» more  CORR 2010»
13 years 9 months ago
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags
Radio Frequency Identification (RFID) technology one of the most promising technologies in the field of ubiquitous computing. Indeed, RFID technology may well replace barcode tech...
Eslam Gamal Ahmed, Eman Shaaban, Mohamed Hashem
CORR
2010
Springer
72views Education» more  CORR 2010»
13 years 9 months ago
Sequential Rationality in Cryptographic Protocols
Much of the literature on rational cryptography focuses on analyzing the strategic properties of cryptographic protocols. However, due to the presence of computationallybounded pl...
Ronen Gradwohl, Noam Livne, Alon Rosen
JIPS
2008
104views more  JIPS 2008»
13 years 9 months ago
MMMP: A MAC Protocol to Ensure QoS for Multimedia Traffic over Multi-hop Ad Hoc Networks
: In this paper, we discuss a novel reservation-based, asynchronous MAC protocol called `Multi-rate Multi-hop MAC Protocol' (MMMP) for multi-hop ad hoc networks that provides ...
Sunil Kumar, Mahasweta Sarkar, Supraja Gurajala, J...
IJNSEC
2007
111views more  IJNSEC 2007»
13 years 9 months ago
A Novel Peer-to-peer Payment Protocol
In this paper a novel electronic payment protocol suitable for “peer-to-peer” (P2P) networks is presented. It implements electronic cash-based transactions, between buyers and...
Despoina Palaka, Petros Daras, Kosmas Petridis, Mi...
JCP
2007
148views more  JCP 2007»
13 years 9 months ago
P3ARM-t: Privacy-Preserving Protocol for Association Rule Mining with t Collusion Resistance
— The ability to mine large volumes of distributed datasets enables more precise decision making. However, privacy concerns should be carefully addressed when mining datasets dis...
Iman Saleh, Mohamed Eltoweissy