Sciweavers

1256 search results - page 23 / 252
» A Simple E-Voting Protocol
Sort
View
120
Voted
JOC
2007
93views more  JOC 2007»
15 years 4 months ago
Robust Information-Theoretic Private Information Retrieval
A Private Information Retrieval (PIR) protocol allows a user to retrieve a data item of its choice from a database, such that the servers storing the database do not gain informat...
Amos Beimel, Yoav Stahl
DCC
2008
IEEE
16 years 4 months ago
Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
LaMacchia, Lauter and Mityagin recently presented a strong security definition for authenticated key agreement strengthening the well-known Canetti-Krawczyk definition. They also ...
Berkant Ustaoglu
INFOCOM
2009
IEEE
15 years 11 months ago
Interference-Aware MAC Protocol for Wireless Networks by a Game-Theoretic Approach
—We propose an interference-aware MAC protocol using a simple transmission strategy motivated by a gametheoretic approach. We formulate a channel access game, which considers nod...
HyungJune Lee, Hyukjoon Kwon, Arik Motskin, Leonid...
125
Voted
JCP
2007
122views more  JCP 2007»
15 years 4 months ago
Converting Group Key Agreement Protocol into Password-Based Setting - Case Study
Abstract— Converting a secure group key agreement protocol into password-based setting is not a trivial task. The security of a password-based scheme hinges on preventing diction...
Ratna Dutta
147
Voted
INFOCOM
2006
IEEE
15 years 10 months ago
Performance Analysis of Contention Based Medium Access Control Protocols
—This paper studies the performance of contention based medium access control (MAC) protocols. In particular, a simple and accurate technique for estimating the throughput of the...
Gaurav Sharma, Ayalvadi J. Ganesh, Peter B. Key