Sciweavers

4305 search results - page 6 / 861
» Analysing Protocol Implementations
Sort
View
PEWASUN
2005
ACM
14 years 1 months ago
Investigating unfairness scenarios in MANET using 802.11b
An experimental study of MANET using 802.11b has shown that there exist several configurations where this standard does not guarantee fairness for the channel access. In this pap...
Leïla Kloul, Fabrice Valois
ECRA
2007
113views more  ECRA 2007»
13 years 7 months ago
Exclusions and related trust relationships in multi-party fair exchange protocols
Some electronic commerce transactions are inherently performed between more than two parties. In this context, it is thus important to determine whether the underlying fair exchan...
Nicolás González-Deleito, Olivier Ma...
EWSN
2006
Springer
14 years 7 months ago
f-MAC: A Deterministic Media Access Control Protocol Without Time Synchronization
Nodes in a wireless network transmit messages through a shared medium. Thus, a Media Access Control (MAC) protocol is necessary to regulate and coordinate medium access. For some a...
André M. Barroso, Cormac J. Sreenan, Utz Ro...
EUROPKI
2007
Springer
13 years 11 months ago
OpenHSM: An Open Key Life Cycle Protocol for Public Key Infrastructure's Hardware Security Modules
Abstract. The private keys used in a PKI are its most important asset. Protect these keys from unauthorised use or disclosure is essential to secure a PKI. Relying parties need ass...
Jean Everson Martina, Túlio Cicero Salvaro ...
WOTE
2010
13 years 5 months ago
Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster
Abstract. While electronic elections promise the possibility of convenient, efficient and secure facilities for recording and tallying votes, recent studies have highlighted inadeq...
Stéphanie Delaune, Steve Kremer, Mark Ryan