Sciweavers

449 search results - page 79 / 90
» Formal Modeling of Communication Protocols by Graph Transfor...
Sort
View
PODC
2012
ACM
13 years 2 months ago
On the (limited) power of non-equivocation
In recent years, there have been a few proposals to add a small amount of trusted hardware at each replica in a Byzantine fault tolerant system to cut back replication factors. Th...
Allen Clement, Flavio Junqueira, Aniket Kate, Rodr...
PDPTA
1997
15 years 29 days ago
Hazard-Free Connection Release
Abstract Fault-tolerant communication in a distributed system requires reliable connection management and message delivery. Reliable connection management includes the guarantee of...
Jennifer E. Walter, Jennifer L. Welch
ENTCS
2007
94views more  ENTCS 2007»
14 years 11 months ago
Virtual Organizations in Arigatoni
Arigatoni is a lightweight overlay network that deploys the Global Computing Paradigm over the Internet. Communication for over the behavioral units of the overlay is performed by...
Michel Cosnard, Luigi Liquori, Raphaël Chand
ESORICS
1994
Springer
15 years 3 months ago
Oblivious Signatures
Abstract. An oblivious signature with n keys (or messages) is a signature that the recipient can choose one of n keys (or messages) to get signed while the signer cannot find out o...
Lidong Chen
75
Voted
IEEEARES
2009
IEEE
15 years 6 months ago
Measuring Voter-Controlled Privacy
—In voting, the notion of receipt-freeness has been proposed to express that a voter cannot gain any information to prove that she has voted in a certain way. It aims to prevent ...
Hugo L. Jonker, Sjouke Mauw, Jun Pang