Sciweavers

1256 search results - page 104 / 252
» A Simple E-Voting Protocol
Sort
View
INFOCOM
1993
IEEE
15 years 8 months ago
Experimental Assessment of End-to-End Behavior on Internet
Over the last decade Internet has grown by orders of magnitude in size. Many of the protocols that were designed several years ago are still in use. It is not clear if the assumpt...
Dheeraj Sanghi, Ashok K. Agrawala, Olafur Gudmunds...
ALGOSENSORS
2006
Springer
15 years 8 months ago
Efficient Training of Sensor Networks
Abstract. Due to their small form factor and modest energy budget, individual sensors are not expected to be GPS-enabled. Moreover, in most applications, exact geographic location ...
Alan A. Bertossi, Stephan Olariu, Maria Cristina P...
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
15 years 8 months ago
Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing
A series of recent papers have demonstrated collision attacks on popularly used hash functions, including the widely deployed MD5 and SHA-1 algorithm. To assess this threat, the na...
Michael Szydlo, Yiqun Lisa Yin
ESWS
2008
Springer
15 years 6 months ago
Semantic Sitemaps: Efficient and Flexible Access to Datasets on the Semantic Web
Increasing amounts of RDF data are available on the Web for consumption by Semantic Web browsers and indexing by Semantic Web search engines. Current Semantic Web publishing practi...
Richard Cyganiak, Holger Stenzhorn, Renaud Delbru,...
DFN
2004
15 years 6 months ago
SIP Security
: Ubiquitous worldwide broadband Internet access as well the coming of age of VoIP technology have made Voice-over-IP an increasingly attractive and useful network application. Cur...
Andreas Steffen, Daniel Kaufmann, Andreas Stricker