Sciweavers

1256 search results - page 139 / 252
» A Simple E-Voting Protocol
Sort
View
CSFW
2006
IEEE
15 years 11 months ago
Simulation-Based Security with Inexhaustible Interactive Turing Machines
Recently, there has been much interest in extending models for simulation-based security in such a way that the runtime of protocols may depend on the length of their input. Findi...
Ralf Küsters
ITNG
2006
IEEE
15 years 11 months ago
An Automated WSDL Generation and Enhanced SOAP Message Processing System for Mobile Web Services
Web services are key applications in business-to-business, business-to-customer, and enterprise applications integration solutions. As the mobile Internet becomes one of the main ...
Gil Cheol Park, Seoksoo Kim, Gun Tae Bae, Yang Sok...
143
Voted
SAC
2006
ACM
15 years 11 months ago
Revisiting 1-copy equivalence in clustered databases
Recently renewed interest in scalable database systems for shared nothing clusters has been supported by replication protocols based on group communication that are aimed at seaml...
Rui Carlos Oliveira, José Pereira, Alfr&aci...
148
Voted
INFOCOM
2005
IEEE
15 years 10 months ago
Limiting path exploration in BGP
— Slow convergence in the Internet can be directly attributed to the “path exploration” phenomenon, inherent in all path vector protocols. The root cause for path exploration...
Jaideep Chandrashekar, Zhenhai Duan, Zhi-Li Zhang,...
IPPS
2005
IEEE
15 years 10 months ago
Local Leader Election, Signal Strength Aware Flooding, and Routeless Routing
We have identified a fundamental operator in wireless networks that we named the local leader election in which the goal is to select a node in a spatially close neighborhood. We ...
Gilbert Chen, Joel W. Branch, Boleslaw K. Szymansk...