Sciweavers

3751 search results - page 541 / 751
» Events in security protocols
Sort
View
INFOCOM
2005
IEEE
15 years 9 months ago
Provably competitive adaptive routing
Abstract— An ad hoc wireless network is an autonomous selforganizing system of mobile nodes connected by wireless links where nodes not in direct range communicate via intermedia...
Baruch Awerbuch, David Holmer, Herbert Rubens, Rob...
ASIACRYPT
2004
Springer
15 years 9 months ago
Secret Handshakes from CA-Oblivious Encryption
Secret handshakes were recently introduced [BDS+ 03] to allow members of the same group to authenticate each other secretly, in the sense that someone who is not a group member ca...
Claude Castelluccia, Stanislaw Jarecki, Gene Tsudi...
137
Voted
CORR
2006
Springer
169views Education» more  CORR 2006»
15 years 4 months ago
Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model
We consider a type of zero-knowledge protocols that are of interest for their practical applications within networks like the Internet: efficient zero-knowledge arguments of knowl...
Yi Deng, Giovanni Di Crescenzo, Dongdai Lin
ICS
2007
Tsinghua U.
15 years 10 months ago
Optimization and bottleneck analysis of network block I/O in commodity storage systems
Building commodity networked storage systems is an important architectural trend; Commodity servers hosting a moderate number of consumer-grade disks and interconnected with a hig...
Manolis Marazakis, Vassilis Papaefstathiou, Angelo...
MOBICOM
2005
ACM
15 years 9 months ago
GrooveSim: a topography-accurate simulator for geographic routing in vehicular networks
Vehicles equipped with wireless communication devices are poised to deliver vital services in the form of safety alerts, traffic congestion probing and on-road commercial applicat...
Rahul Mangharam, Daniel S. Weller, Daniel D. Stanc...