Sciweavers

4111 search results - page 15 / 823
» Security, Protocols, and Trust
Sort
View
STOC
1996
ACM
185views Algorithms» more  STOC 1996»
14 years 23 days ago
Adaptively Secure Multi-Party Computation
A fundamental problem in designing secure multi-party protocols is how to deal with adaptive adversaries i.e., adversaries that may choose the corrupted parties during the course ...
Ran Canetti, Uriel Feige, Oded Goldreich, Moni Nao...
IJNSEC
2008
132views more  IJNSEC 2008»
13 years 8 months ago
Optimal Energy-Delay Routing Protocol with Trust Levels for Wireless Ad Hoc Networks
This paper presents the Trust Level Routing (TLR) protocol, an extension of the optimized energy-delay routing (OEDR) protocol, focusing on the integrity, reliability and survivab...
Eyad Taqieddin, S. Jagannathan, Ann Miller
CNSR
2004
IEEE
14 years 11 days ago
Trusted Route Discovery with TORA Protocol
An ad-hoc network is formed when a group of wireless nodes pledge to help each other in passing packets based upon a pre-agreed protocol. Temporally Ordered Routing Algorithm (TOR...
Asad Amir Pirzada, Chris McDonald
DATE
2007
IEEE
73views Hardware» more  DATE 2007»
14 years 3 months ago
Design methods for security and trust
The design of ubiquitous and embedded computers focuses on cost factors such as area, power-consumption, and performance. Security and trust properties, on the other hand, are oft...
Ingrid Verbauwhede, Patrick Schaumont
IJSN
2006
116views more  IJSN 2006»
13 years 8 months ago
Secure collaborations over message boards
: We provide a message board model for collaborative systems, and propose an architecture and protocol for securing collaborative applications over message boards. The proposed arc...
Mahalingam Ramkumar, Nasir D. Memon