Sciweavers

404 search results - page 20 / 81
» Performance Comparison of Secure Comparison Protocols
Sort
View
78
Voted
ICC
2007
IEEE
134views Communications» more  ICC 2007»
15 years 3 months ago
Performance Analysis of Polling based TDMA MAC Protocols with Sleep and Wakeup Cycles
— In sensor networks, MAC protocols based on Time Division Multiple Access (TDMA) with wakeup and sleep periods have attracted considerable interest because of their low power co...
Haiming Yang, Biplab Sikdar
ICC
2007
IEEE
119views Communications» more  ICC 2007»
15 years 3 months ago
Performance Analysis of a Network-Based Protocol for Localized IP Mobility Management
— In this paper a new protocol for IP mobility management is described, which follows a network-based approach and fulfils the requirements of optimized usage of radio spectrum a...
Ivano Guardini, Gerardo Giaretta, Francesco Miconi
73
Voted
IFIP
2004
Springer
15 years 2 months ago
Decidability of Opacity with Non-Atomic Keys
The most studied property, secrecy, is not always sufficient to prove the security of a protocol. Other properties such as anonymity, privacy or opacity could be useful. Here, we u...
Laurent Mazaré
83
Voted
CSREASAM
2006
14 years 11 months ago
Efficient and Secure Authentication Protocols for Mobile VoIP Communications
Mobile Voice over IP (Mobile VoIP) allows mobile users to continuously talk with each others while roaming across different networks. In such wireless application, it is vulnerabl...
Huang-Ju Chen, Jyh-Ming Huang, Lei Wang
ICDE
2005
IEEE
100views Database» more  ICDE 2005»
15 years 11 months ago
Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants
Standard multi-party computation models assume semi-honest behavior, where the majority of participants implement protocols according to specification, an assumption not always pl...
Bradley Malin, Edoardo Airoldi, Samuel Edoho-Eket,...