Sciweavers

420 search results - page 22 / 84
» Efficient Implementation of the Orlandi Protocol
Sort
View
120
Voted
SCN
2008
Springer
15 years 12 days ago
Simplified Submission of Inputs to Protocols
Consider an electronic election scheme implemented using a mix-net; a large number of voters submit their votes and then a smaller number of servers compute the result. The mix-net...
Douglas Wikström
138
Voted
SCN
2010
Springer
232views Communications» more  SCN 2010»
14 years 10 months ago
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model
Serge Vaudenay [20] introduced a notion of Message Authentication (MA) protocols in the Short Authenticated String (SAS) model. A SAS-MA protocol authenticates arbitrarily long mes...
Stanislaw Jarecki, Nitesh Saxena
106
Voted
EWSN
2009
Springer
16 years 1 months ago
Multi-hop Cluster Hierarchy Maintenance in Wireless Sensor Networks: A Case for Gossip-Based Protocols
Multi-hop cluster hierarchy has been presented as an organization for large wireless sensor networks (WSNs) that can provide scalable routing, data aggregation, and querying. In th...
Konrad Iwanicki, Maarten van Steen
96
Voted
ICDCS
2003
IEEE
15 years 5 months ago
SPEED: A Stateless Protocol for Real-Time Communication in Sensor Networks
In this paper, we present a real-time communication protocol for sensor networks, called SPEED. The protocol provides three types of real-time communication services, namely, real...
Tian He, John A. Stankovic, Chenyang Lu, Tarek F. ...
96
Voted
CSREASAM
2004
15 years 1 months ago
Experimental Analysis of the Arcanum Key Exchange Protocol
A VPN establishes a secure network using the insecure media of the Internet. However, before a VPN can be established keys must be exchanged between the communicating peers. In th...
Ajmal S. Mian, Raja Iqbal