Sciweavers

529 search results - page 3 / 106
» A Fair Non-repudiation Protocol
Sort
View
CCR
1999
92views more  CCR 1999»
15 years 1 months ago
A fair certification protocol
In this paper a `fair' key generation and certification protocol for Diffie-Hellman keys is proposed, which is intended for use in cases where neither User nor CA are trusted...
Chris J. Mitchell, Konstantinos Rantos
125
Voted
PIMRC
2010
IEEE
14 years 11 months ago
A fair and Adaptive Contention Resolution Algorithm for time-slotted MAC protocol designs
Abstract--This paper addresses the fairness of Medium Access Control (MAC) protocols that are capable of handling interference on the physical layer to a varying extent. The variat...
Ulrike Korger, Yingrui Chen, Christian Hartmann, K...
94
Voted
ADT
2010
15 years 1 months ago
Fair data collection in wireless sensor networks: analysis and protocol
Md. Abdul Hamid, Muhammad Mahbub Alam, Md. Sharifu...
99
Voted
TON
1998
77views more  TON 1998»
15 years 1 months ago
Time-shift scheduling - fair scheduling of flows in high-speed networks
—We present a scheduling protocol, called time-shift scheduling, to forward packets from multiple input flows to a single output channel. Each input flow is guaranteed a predet...
Jorge Arturo Cobb, Mohamed G. Gouda, Amal El-Nahas
CORR
2010
Springer
86views Education» more  CORR 2010»
15 years 11 days ago
Secure Multiparty Computation with Partial Fairness
A protocol for computing a functionality is secure if an adversary in this protocol cannot cause more harm than in an ideal computation where parties give their inputs to a truste...
Amos Beimel, Eran Omri, Ilan Orlov