Sciweavers

1106 search results - page 160 / 222
» Automated Design of Security Protocols
Sort
View
EEE
2005
IEEE
15 years 10 months ago
Who Counts Your Votes?
Open and fair elections are paramount to modern democracy. Although some people claim that the penciland-paper systems used in countries such as Canada and UK are still the best m...
Halina Kaminski, Lila Kari, Mark Perry
HOLOMAS
2003
Springer
15 years 9 months ago
Agent Exchange - Virtual Trading Environment
Agent Exchange is a virtual trading environment serving as a test bed for experiments with market simulations, trading strategies and auctioning techniques. Agent Exchange is the d...
Jirí Hodík, Milan Rollo, Petr Nov&aa...
WMI
2001
147views more  WMI 2001»
15 years 5 months ago
A wireless public access infrastructure for supporting mobile context-aware IPv6 applications
This paper presents a novel wireless access point architecture designed to support the development of next generation mobile context-aware applications over metropolitan scale are...
Adrian Friday, Maomao Wu, Stefan Schmid, Joe Finne...
IACR
2011
192views more  IACR 2011»
14 years 4 months ago
The Hummingbird-2 Lightweight Authenticated Encryption Algorithm
Hummingbird-2 is an encryption algorithm with a 128-bit secret key and a 64-bit initialization vector. Hummingbird-2 optionally produces an authentication tag for each message proc...
Daniel Engels, Markku-Juhani O. Saarinen, Peter Sc...
WISTP
2010
Springer
15 years 11 months ago
Towards Electrical, Integrated Implementations of SIMPL Systems
ct This paper discusses the practical implementation of a novel security tool termed SIMPL system, which was introduced in [1]. SIMPL systems can be regarded as a public key versio...
Ulrich Rührmair, Qingqing Chen, Martin Stutzm...