Sciweavers

1256 search results - page 103 / 252
» A Simple E-Voting Protocol
Sort
View
IFIP
2004
Springer
15 years 10 months ago
Decidability of Opacity with Non-Atomic Keys
The most studied property, secrecy, is not always sufficient to prove the security of a protocol. Other properties such as anonymity, privacy or opacity could be useful. Here, we u...
Laurent Mazaré
INFOCOM
2003
IEEE
15 years 10 months ago
Capacity, Delay and Mobility in Wireless Ad-Hoc Networks
Abstract— Network throughput and packet delay are two important parameters in the design and the evaluation of routing protocols for ad-hoc networks. While mobility has been show...
Nikhil Bansal, Zhen Liu
ISORC
2002
IEEE
15 years 9 months ago
Approximate Real-Time Clocks for Scheduled Events
This paper presents a simple protocol that provides application processes with an approximate real-time notion. This time notion is very versatile. At one extreme, it behaves at l...
Christof Fetzer, Michel Raynal
ITCC
2002
IEEE
15 years 9 months ago
Performance of Multimedia Applications with IPSec Tunneling
The concept of Virtual Private Networks offers a simple and cheap alternative to dedicated secure networks in corporate networks and Internet environments. The choice, however, of...
Samir Al-Khayatt, Siraj A. Shaikh, Babak Akhgar, J...
DAC
1999
ACM
15 years 9 months ago
Distributed Application Development with Inferno
Distributed computing has taken a new importance in order to meet the requirements of users demanding information “anytime, anywhere.” Inferno facilitates the creation and sup...
Ravi Sharma