Sciweavers

1256 search results - page 160 / 252
» A Simple E-Voting Protocol
Sort
View
ESORICS
2000
Springer
15 years 4 months ago
Authentication and Confidentiality via IPSEC
The IP security protocols (IPsec) may be used via security gateways that apply cryptographic operations to provide security services to datagrams, and this mode of use is supported...
Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer
93
Voted
FAST
2008
15 years 3 months ago
TierStore: A Distributed Filesystem for Challenged Networks in Developing Regions
TierStore is a distributed filesystem that simplifies the development and deployment of applications in challenged network environments, such as those in developing regions. For e...
Michael J. Demmer, Bowei Du, Eric A. Brewer
92
Voted
FC
2008
Springer
97views Cryptology» more  FC 2008»
15 years 2 months ago
OpenPGP-Based Financial Instruments and Dispute Arbitration
In this paper, we present some guidelines for implementing various financial instruments for the purposes of credit and payment, including protocols for commercial transactions, di...
Daniel A. Nagy, Nadzeya V. Shakel
108
Voted
IM
2007
15 years 2 months ago
An information model for the management of Optical Burst Switched networks
Abstract— The Optical Burst Switching (OBS) paradigm proposes a new set of transmission protocols and network architectures that permits the high-utilization of the raw bandwidth...
Jorge E. López de Vergara, Javier Aracil, J...
95
Voted
NETWORKING
2008
15 years 2 months ago
Thorough Analysis of 802.11e Star Topology Scenarios in the Presence of Hidden Nodes
In this paper the authors present a simulation study of two 802.11e network scenarios. The presented analysis is not only novel but most of all crucial for understanding how a theo...
Katarzyna Kosek, Marek Natkaniec, Luca Vollero