Sciweavers

422 search results - page 26 / 85
» Protocol Specialization
Sort
View
AMCS
2011
341views Mathematics» more  AMCS 2011»
14 years 9 months ago
FSP and FLTL framework for specification and verification of middle-agents
Agents are a useful abstraction frequently employed as a basic building block in modeling service, information and resource sharing in global environments. The connecting of reques...
Amelia Badica, Costin Badica
CCS
2001
ACM
15 years 5 months ago
A verifiable secret shuffle and its application to e-voting
We present a mathematical construct which provides a cryptographic protocol to verifiably shuffle a sequence of k modular integers, and discuss its application to secure, universa...
C. Andrew Neff
IACR
2011
127views more  IACR 2011»
14 years 1 months ago
Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority
Secure multiparty computation (MPC) allows a set of n players to compute any public function, given as an arithmetic circuit, on private inputs, so that privacy of the inputs as we...
Eli Ben-Sasson, Serge Fehr, Rafail Ostrovsky
INFOCOM
2002
IEEE
15 years 6 months ago
TCP-SMO: Extending TCP to Support Medium-Scale Multicast Applications
Abstract—Scalable reliable multicast protocols have been a focus of recent research, tackling the problem of efficient reliable data delivery to an arbitrarily large number of r...
Sam Liang, David R. Cheriton
I3E
2009
134views Business» more  I3E 2009»
14 years 11 months ago
Realizing Mobile Web Services for Dynamic Applications
Use of web services also on mobile devices becomes increasingly relevant. However, realizing such mobile web services based on the standard protocol stack is often inappropriate f...
Sonja Zaplata, Viktor Dreiling, Winfried Lamersdor...