Sciweavers

1256 search results - page 183 / 252
» A Simple E-Voting Protocol
Sort
View
AFRICACRYPT
2010
Springer
15 years 7 months ago
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
The market for RFID technology has grown rapidly over the past few years. Going along with the proliferation of RFID technology is an increasing demand for secure and privacy-prese...
Marcel Medwed, François-Xavier Standaert, J...
89
Voted
GLOBECOM
2008
IEEE
15 years 7 months ago
Performance Improvement of Voice over Multihop 802.11 Networks
—Extensive studies on supporting voice traffic over wireless 802.11 networks have been carried out in the literature. Most of them were focused only on one hop infrastructure mo...
Chenhui Hu, Youyun Xu, Wen Chen, Xinbing Wang, Yun...
95
Voted
IEEEIAS
2008
IEEE
15 years 7 months ago
A Model for the Study of Privacy Issues in Secure Shell Connections
: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
88
Voted
IPPS
2008
IEEE
15 years 7 months ago
Absolute Slicing in Peer-to-peer Systems
Peer-to-peer (P2P) systems are slowly moving from application-specific architectures to a generic serviceoriented design framework. The idea is to allow a dynamic collection of P...
Alberto Montresor, Roberto Zandonati
103
Voted
IPPS
2008
IEEE
15 years 7 months ago
Exploiting spatial parallelism in Ethernet-based cluster interconnects
In this work we examine the implications of building a single logical link out of multiple physical links. We use MultiEdge [12] to examine the throughput-CPU utilization tradeoff...
Stavros Passas, George Kotsis, Sven Karlsson, Ange...