Sciweavers

688 search results - page 59 / 138
» Network Coding Protocols for Secret Key Distribution
Sort
View
146
Voted
EUROCRYPT
2007
Springer
15 years 10 months ago
Atomic Secure Multi-party Multiplication with Low Communication
We consider the standard secure multi-party multiplication protocol due to M. Rabin. This protocol is based on Shamir’s secret sharing scheme and it can be viewed as a practical ...
Ronald Cramer, Ivan Damgård, Robbert de Haan
ICPPW
2002
IEEE
15 years 9 months ago
System Services for Implementing Ad-Hoc Routing Protocols
This paper explores several systems issues regarding the implementation of routing protocols for mobile ad-hoc networks. It proclaims that support for on-demand routing is insufï¬...
Vikas Kawadia, Yongguang Zhang, Binita Gupta
GLOBECOM
2007
IEEE
15 years 11 months ago
A Novel MAC Protocol for Cooperative Downloading in Vehicular Networks
—In this paper, we propose a novel protocol called VC-MAC that utilizes the concept of cooperative communication tailored for vehicular networks, especially for gateway downloadi...
Jin Zhang, Qian Zhang, Weijia Jia
ACMICEC
2004
ACM
148views ECommerce» more  ACMICEC 2004»
15 years 10 months ago
A secure and private clarke tax voting protocol without trusted authorities
Electronic voting has become one of the most popular activities over the Internet. Security and privacy are always regarded as crucial factors in electronic voting system design. ...
Changjie Wang, Ho-fung Leung
142
Voted
CSFW
2009
IEEE
15 years 11 months ago
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks
We present a formal model for modeling and reasoning about security protocols. Our model extends standard, inductive, trace-based, symbolic approaches with a formalization of phys...
Patrick Schaller, Benedikt Schmidt, David A. Basin...