Sciweavers

1256 search results - page 51 / 252
» A Simple E-Voting Protocol
Sort
View
IPPS
1999
IEEE
15 years 5 months ago
Performance Results for a Reliable Low-Latency Cluster Communication Protocol
Existing low-latency protocols make unrealistically strong assumptions about reliability. This allows them to achieve impressive performance, but also prevents this performance bei...
Stephen R. Donaldson, Jonathan M. D. Hill, David B...
CRYPTO
2006
Springer
112views Cryptology» more  CRYPTO 2006»
15 years 4 months ago
On Expected Constant-Round Protocols for Byzantine Agreement
In a seminal paper, Feldman and Micali (STOC '88) show an n-party Byzantine agreement protocol tolerating t < n/3 malicious parties that runs in expected constant rounds. H...
Jonathan Katz, Chiu-Yuen Koo
106
Voted
CSREASAM
2006
15 years 2 months ago
Efficient and Secure Authentication Protocols for Mobile VoIP Communications
Mobile Voice over IP (Mobile VoIP) allows mobile users to continuously talk with each others while roaming across different networks. In such wireless application, it is vulnerabl...
Huang-Ju Chen, Jyh-Ming Huang, Lei Wang
INFORMATICALT
2007
76views more  INFORMATICALT 2007»
15 years 22 days ago
An Integrative Framework to Protocol Analysis and Repair: Bellare-Rogaway Model + Planning + Model Checker
A modified version of the Bellare and Rogaway (1993) adversarial model is encoded using Asynchronous Product Automata (APA). A model checker tool, Simple Homomorphism Verificatio...
Kim-Kwang Raymond Choo
111
Voted
ISPASS
2007
IEEE
15 years 7 months ago
Simplifying Active Memory Clusters by Leveraging Directory Protocol Threads
Address re-mapping techniques in so-called active memory systems have been shown to dramatically increase the performance of applications with poor cache and/or communication beha...
Dhiraj D. Kalamkar, Mainak Chaudhuri, Mark Heinric...