Sciweavers

1256 search results - page 29 / 252
» A Simple E-Voting Protocol
Sort
View
83
Voted
SIAMCOMP
2010
97views more  SIAMCOMP 2010»
14 years 11 months ago
Designing Network Protocols for Good Equilibria
Designing and deploying a network protocol determines the rules by which end users interact with each other and with the network. We consider the problem of designing a protocol t...
Ho-Lin Chen, Tim Roughgarden, Gregory Valiant
CSREASAM
2006
15 years 2 months ago
On Security in TCP/IP over Wireless Network
- The Transmission Control Protocol/Internet Protocol (TCP/IP) is combination of different protocols at various layers. TCP/IP is the basic communication language or protocol of th...
Shamila Makki, Wunnava V. Subbarao
94
Voted
WECWIS
2003
IEEE
85views ECommerce» more  WECWIS 2003»
15 years 6 months ago
Intermediary Non-repudiation Protocols
In commercial transactions, an intermediary might be involved to help transacting parties to conduct their business. Nevertheless, the intermediary may not be fully trusted. In th...
Jose Antonio Onieva, Jianying Zhou, Mildrey Carbon...
100
Voted
ESORICS
2003
Springer
15 years 6 months ago
An On-the-Fly Model-Checker for Security Protocol Analysis
We introduce the on-the-fly model-checker OFMC, a tool that combines two methods for analyzing security protocols. The first is the use of lazy data-types as a simple way of buil...
David A. Basin, Sebastian Mödersheim, Luca Vi...
103
Voted
IJNSEC
2006
122views more  IJNSEC 2006»
15 years 23 days ago
A Hash-based Strong Password Authentication Protocol with User Anonymity
Password authentication protocols range from complex public-key cryptosystems to simple hash-based password authentication schemes. One common feature of these protocols is that t...
Kumar V. Mangipudi, Rajendra S. Katti