Sciweavers

4305 search results - page 59 / 861
» Analysing Protocol Implementations
Sort
View
SEC
2001
13 years 10 months ago
Security Analysis of the Cliques Protocols Suites: First Results
: The Cliques protocols are extensions of the Diffie-Hellman key exchange protocol to a group setting. In this paper, we are analysing the A-GDH.2 suite that is intended to allow a...
Olivier Pereira, Jean-Jacques Quisquater
DCOSS
2005
Springer
14 years 2 months ago
Design and Analysis of Wave Sensing Scheduling Protocols for Object-Tracking Applications
Abstract. Many sensor network applications demand tightly-bounded object detection quality. To meet such stringent requirements, we develop three sensing scheduling protocols to gu...
Shansi Ren, Qun Li, Haining Wang, Xiaodong Zhang
ESORICS
2010
Springer
13 years 10 months ago
Election Verifiability in Electronic Voting Protocols
We present a formal, symbolic definition of election verifiability for electronic voting protocols in the context of the applied pi calculus. Our definition is given in terms of bo...
Steve Kremer, Mark Ryan, Ben Smyth
ENTCS
2007
98views more  ENTCS 2007»
13 years 8 months ago
Evaluating Complex MAC Protocols for Sensor Networks with APMC
In this paper we present an analysis of a MAC (Medium Access Control) protocol for wireless sensor networks. The purpose of this protocol is to manage wireless media access by con...
Michaël Cadilhac, Thomas Hérault, Rich...
JCS
2011
126views more  JCS 2011»
13 years 3 months ago
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
One of the main challenges in pervasive computing is how we can establish secure communication over an untrusted high-bandwidth network without any initial knowledge or a Public K...
L. H. Nguyen, A. W. Roscoe