Sciweavers

1059 search results - page 103 / 212
» Modeling Security Protocols as Games
Sort
View
COLCOM
2005
IEEE
15 years 6 months ago
Distributed floor control protocols for computer collaborative applications on overlay networks
— Computer supported collaborative applications on overlay networks are gaining popularity among users who are geographically dispersed. Examples of these kinds of applications i...
Shankar M. Banik, Sridhar Radhakrishnan, Tao Zheng...
NDSS
2008
IEEE
15 years 7 months ago
A New Privacy-Enhanced Matchmaking Protocol
Although several wide-spread internet applications (e.g., job-referral services, dating services) can benefit from online matchmaking, protocols defined over the past two decade...
Ji Sun Shin, Virgil D. Gligor
130
Voted
PODC
2009
ACM
16 years 1 months ago
Load balancing without regret in the bulletin board model
We analyze the performance of protocols for load balancing in distributed systems based on no-regret algorithms from online learning theory. These protocols treat load balancing a...
Éva Tardos, Georgios Piliouras, Robert D. K...
104
Voted
IJIS
2007
94views more  IJIS 2007»
15 years 13 days ago
The eightfold way of deliberation dialogue
Deliberation dialogues occur when two or more participants seek to jointly agree an action or a course of action in some situation. We present the first formal framework for such...
Peter McBurney, David Hitchcock, Simon Parsons
IJNSEC
2010
100views more  IJNSEC 2010»
14 years 7 months ago
On the Security of Yuan et al.'s Undeniable Signature Scheme
Undeniable signatures were proposed to limit the public verification property of ordinary digital signature. In fact, the verification of such signatures cannot be obtained withou...
Wei Zhao