Sciweavers

422 search results - page 28 / 85
» Protocol Specialization
Sort
View
137
Voted
PKC
2005
Springer
93views Cryptology» more  PKC 2005»
15 years 9 months ago
Optimizing Robustness While Generating Shared Secret Safe Primes
We develop a method for generating shared, secret, safe primes applicable to use in threshold RSA signature schemes such as the one developed by Shoup. We would like a scheme usabl...
Emil Ong, John Kubiatowicz
116
Voted
CORR
2009
Springer
95views Education» more  CORR 2009»
15 years 1 months ago
Execution Models for Choreographies and Cryptoprotocols
A choreography describes a transaction in which several principals interact. Since choreographies frequently describe business processes affecting substantial assets, we need a se...
Marco Carbone, Joshua D. Guttman
120
Voted
CORR
2011
Springer
142views Education» more  CORR 2011»
14 years 10 months ago
Power Allocation Games in Interference Relay Channels: Existence Analysis of Nash Equilibria
We consider a network composed of two interfering point-to-point links where the two transmitters can exploit one common relay node to improve their individual transmission rate. ...
Elena Veronica Belmega, Samson Lasaulce
142
Voted
ADHOCNOW
2008
Springer
15 years 10 months ago
Energy-Efficient Multi-path Routing in Wireless Sensor Networks
The paper investigates the usefulness of multi-path routing to achieve lifetime improvements by load balancing and exploiting cross-layer information in wireless sensor networks. P...
Philipp Hurni, Torsten Braun
127
Voted
WPES
2003
ACM
15 years 9 months ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More