Sciweavers

1106 search results - page 160 / 222
» Automated Design of Security Protocols
Sort
View
EEE
2005
IEEE
14 years 4 months ago
Who Counts Your Votes?
Open and fair elections are paramount to modern democracy. Although some people claim that the penciland-paper systems used in countries such as Canada and UK are still the best m...
Halina Kaminski, Lila Kari, Mark Perry
HOLOMAS
2003
Springer
14 years 4 months ago
Agent Exchange - Virtual Trading Environment
Agent Exchange is a virtual trading environment serving as a test bed for experiments with market simulations, trading strategies and auctioning techniques. Agent Exchange is the d...
Jirí Hodík, Milan Rollo, Petr Nov&aa...
WMI
2001
147views more  WMI 2001»
14 years 16 days ago
A wireless public access infrastructure for supporting mobile context-aware IPv6 applications
This paper presents a novel wireless access point architecture designed to support the development of next generation mobile context-aware applications over metropolitan scale are...
Adrian Friday, Maomao Wu, Stefan Schmid, Joe Finne...
IACR
2011
192views more  IACR 2011»
12 years 10 months ago
The Hummingbird-2 Lightweight Authenticated Encryption Algorithm
Hummingbird-2 is an encryption algorithm with a 128-bit secret key and a 64-bit initialization vector. Hummingbird-2 optionally produces an authentication tag for each message proc...
Daniel Engels, Markku-Juhani O. Saarinen, Peter Sc...
WISTP
2010
Springer
14 years 6 months ago
Towards Electrical, Integrated Implementations of SIMPL Systems
ct This paper discusses the practical implementation of a novel security tool termed SIMPL system, which was introduced in [1]. SIMPL systems can be regarded as a public key versio...
Ulrich Rührmair, Qingqing Chen, Martin Stutzm...