Sciweavers

1256 search results - page 30 / 252
» A Simple E-Voting Protocol
Sort
View
114
Voted
PERCOM
2007
ACM
16 years 11 days ago
A three round authenticated group key agreement protocol for ad hoc networks
Group Key Agreement (GKA) protocols enable the participants to derive a key based on each one's contribution over a public network without any central authority. They also pr...
Daniel Augot, Raghav Bhaskar, Valérie Issarny, Da...
114
Voted
WOWMOM
2005
ACM
138views Multimedia» more  WOWMOM 2005»
15 years 6 months ago
A Scenario-Based Performance Evaluation of Multicast Routing Protocols for Ad Hoc Networks
Current ad hoc multicast routing protocols have been designed to build and maintain a tree or mesh in the face of a mobile environment, with fast reaction to network changes in or...
Manoj Pandey, Daniel Zappala
87
Voted
ECBS
2010
IEEE
113views Hardware» more  ECBS 2010»
15 years 4 months ago
Do Sensornet Protocol Variants Yield Real Benefits?
Simple, stateless networking protocols provide a low-cost and predictable foundation upon which to build decentralised applications. Sensornets are complex, containing emergent be...
Jonathan Tate, Iain Bate
111
Voted
WASA
2009
Springer
127views Algorithms» more  WASA 2009»
15 years 7 months ago
Experimental Study on Secure Data Collection in Vehicular Sensor Networks
Abstract. In this paper, we show through a simple secure symmetric key based protocol design and its implementation the feasibility of secure data collection in a vehicular sensor ...
Harry Gao, Seth Utecht, Fengyuan Xu, Haodong Wang,...
106
Voted
LPAR
2005
Springer
15 years 6 months ago
Algebraic Intruder Deductions
Abstract. Many security protocols fundamentally depend on the algebraic properties of cryptographic operators. It is however difficult to handle these properties when formally anal...
David A. Basin, Sebastian Mödersheim, Luca Vi...