Sciweavers

176 search results - page 32 / 36
» Abstraction and Refinement in Protocol Derivation
Sort
View
PAIRING
2010
Springer
149views Cryptology» more  PAIRING 2010»
14 years 11 months ago
Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement
Abstract. We discuss the relationship between ID-based key agreement protocols, certificateless encryption and ID-based key encapsulation mechanisms. In particular we show how in s...
Dario Fiore, Rosario Gennaro, Nigel P. Smart
109
Voted
GI
2009
Springer
14 years 11 months ago
Towards the impact of the operational environment on the security of e-voting
Abstract: Our paper deals with the security of operational environments for evoting and its importance for the security of electronic elections. So far the security of e-voting was...
Axel Schmidt, Melanie Volkamer, Lucie Langer, Joha...
ICC
2009
IEEE
121views Communications» more  ICC 2009»
14 years 11 months ago
Three Layered Hidden Markov Models for Binary Digital Wireless Channels
Abstract--Generative models are created to be used in the design and performance assessment of high layer wireless communication protocols and some error control strategies. Genera...
Omar S. Salih, Cheng-Xiang Wang, David I. Laurenso...
ICNP
2009
IEEE
15 years 8 months ago
EMS: Encoded Multipath Streaming for Real-time Live Streaming Applications
Abstract—Multipath streaming protocols have recently attracted much attention because they provide an effective means to provide high-quality streaming over the Internet. However...
Alix L. H. Chow, Hao Yang, Cathy H. Xia, Minkyong ...
INFOCOM
2009
IEEE
15 years 8 months ago
A Queueing Model Framework of PCE-Based Inter-Area Path Computation
Abstract—Path computation elements (PCE’s) are used to compute end-to-end paths across multiple areas. Multiple PCE’s may be dedicated to each area to provide sufficient path...
Juanjuan Yu, Yue He, Kai Wu, Marco Tacca, Andrea F...