Sciweavers

529 search results - page 3 / 106
» A Fair Non-repudiation Protocol
Sort
View
CCR
1999
92views more  CCR 1999»
13 years 6 months ago
A fair certification protocol
In this paper a `fair' key generation and certification protocol for Diffie-Hellman keys is proposed, which is intended for use in cases where neither User nor CA are trusted...
Chris J. Mitchell, Konstantinos Rantos
PIMRC
2010
IEEE
13 years 4 months ago
A fair and Adaptive Contention Resolution Algorithm for time-slotted MAC protocol designs
Abstract--This paper addresses the fairness of Medium Access Control (MAC) protocols that are capable of handling interference on the physical layer to a varying extent. The variat...
Ulrike Korger, Yingrui Chen, Christian Hartmann, K...
ADT
2010
13 years 6 months ago
Fair data collection in wireless sensor networks: analysis and protocol
Md. Abdul Hamid, Muhammad Mahbub Alam, Md. Sharifu...
TON
1998
77views more  TON 1998»
13 years 6 months ago
Time-shift scheduling - fair scheduling of flows in high-speed networks
—We present a scheduling protocol, called time-shift scheduling, to forward packets from multiple input flows to a single output channel. Each input flow is guaranteed a predet...
Jorge Arturo Cobb, Mohamed G. Gouda, Amal El-Nahas
CORR
2010
Springer
86views Education» more  CORR 2010»
13 years 5 months ago
Secure Multiparty Computation with Partial Fairness
A protocol for computing a functionality is secure if an adversary in this protocol cannot cause more harm than in an ideal computation where parties give their inputs to a truste...
Amos Beimel, Eran Omri, Ilan Orlov