Sciweavers

1106 search results - page 82 / 222
» Automated Design of Security Protocols
Sort
View
IJACT
2010
90views more  IJACT 2010»
14 years 4 months ago
Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optima
: We study the interplay of network connectivity and the issues related to the `possibility', `feasibility' and `optimality' for unconditionally reliable message tra...
Arpita Patra, Ashish Choudhury, C. Pandu Rangan, K...
FC
2007
Springer
138views Cryptology» more  FC 2007»
15 years 4 months ago
Cryptographic Securities Exchanges
While transparency in financial markets should enhance liquidity, its exploitation by unethical and parasitic traders discourages others from fully embracing disclosure of their o...
Christopher Thorpe, David C. Parkes
ECRTS
2002
IEEE
15 years 2 months ago
The FTT-Ethernet Protocol: Merging Flexibility, Timeliness and Efficiency
Despite having been designed to interconnect office equipment such as computers and printers, since its early days Ethernet has also been considered for use in the industrial doma...
Paulo Pedreiras, Luís Almeida, Paolo Gai
IACR
2011
124views more  IACR 2011»
13 years 9 months ago
Efficient Multicast Key Distribution Using HOWF-based Access Control Structures
— Both broadcast encryption (BE) protocols and multicast key distribution (MKD) protocols try to solve the same problem of private group communication. For the first time, we dis...
Jing Liu, Qiong Huang, Bo Yang
FC
2003
Springer
133views Cryptology» more  FC 2003»
15 years 3 months ago
Secure Generalized Vickrey Auction Using Homomorphic Encryption
Combinatorial auctions have recently attracted the interest of many researchers due to their promising applications such as the spectrum auctions recently held by the FCC. In a com...
Koutarou Suzuki, Makoto Yokoo