Sciweavers

275 search results - page 36 / 55
» Analysis of a Fair Exchange Protocol
Sort
View
INFOCOM
2012
IEEE
12 years 1 months ago
Towards energy-fairness in asynchronous duty-cycling sensor networks
Abstract—In this paper, we investigate the problem of controlling node sleep intervals so as to achieve the min-max energy fairness in asynchronous duty-cycling sensor networks. ...
Zhenjiang Li, Mo Li, Yunhao Liu
AINA
2009
IEEE
14 years 5 months ago
A Simple Distributed ID Assignment Scheme for CSMA/IC Using Well Arranged Rotation ID in Ad Hoc Networks
Carrier Sense Multiple Access / ID Countdown (CSMA/IC) is a collision-free ad hoc MAC protocol. CSMA/IC avoids simultaneous medium access by competing with a local unique ID assig...
Ki-seok Lee, Cheeha Kim
IIWAS
2008
14 years 11 days ago
A model-prover for constrained dynamic conversations
In a service-oriented architecture, systems communicate by exchanging messages. In this work, we propose a formal model based on OCL-constrained UML Class diagrams and a methodolo...
Diletta Cacciagrano, Flavio Corradini, Rosario Cul...
IEEEIAS
2009
IEEE
13 years 8 months ago
On Security Notions for Verifiably Encrypted Signature
First we revisit three - BGLS, MBGLS and GZZ verifiably encrypted signature schemes [2, 3, 6]. We find that they are all not strong unforgeable.We remark that the notion of existen...
Xu An Wang, Xiaoyuan Yang, Qingquan Peng
MOBISYS
2005
ACM
14 years 10 months ago
Shake them up!: a movement-based pairing protocol for CPU-constrained devices
This paper presents a new pairing protocol that allows two CPU-constrained wireless devices Alice and Bob to establish a shared secret at a very low cost. To our knowledge, this i...
Claude Castelluccia, Pars Mutaf