Sciweavers

422 search results - page 4 / 85
» Protocol Specialization
Sort
View
57
Voted
ATAL
2004
Springer
15 years 5 months ago
Flexible Agent Dialogue Strategies and Societal Communication Protocols
We propose an argumentation-based framework for representing communication theories of agents that can take into account dialogue strategies and society protocols in a way that fa...
Antonis C. Kakas, Nicolas Maudet, Pavlos Moraitis
76
Voted
WWW
2002
ACM
16 years 10 days ago
Certified email with a light on-line trusted third party: design and implementation
This paper presents a new protocol for certified email. The protocol aims to combine security, scalability, easy implementation, and viable deployment. The protocol relies on a li...
Martín Abadi, Neal Glew
107
Voted
IJNSEC
2007
122views more  IJNSEC 2007»
14 years 11 months ago
Group Oriented Identity-based Deniable Authentication Protocol from the Bilinear Pairings
Deniable authentication protocol is different from traditional authentication protocol in that the intended receiver can authenticate the source of a given message, but cannot pr...
Rongxing Lu, Zhenfu Cao
93
Voted
VTC
2010
IEEE
180views Communications» more  VTC 2010»
14 years 10 months ago
Dynamic Channel Reservation to Enhance Channel Access by Exploiting Structure of Vehicular Networks
Abstract—VANET protocols need to exploit the special structure of vehicular networks. This structure includes the onedimensional nature of roads, the structure of lanes, the grou...
Ray K. Lam, P. R. Kumar
ASIACRYPT
2004
Springer
15 years 5 months ago
New Approaches to Password Authenticated Key Exchange Based on RSA
We investigate efficient protocols for password-authenticated key exchange based on the RSA public-key cryptosystem. To date, most of the published protocols for password-authentic...
Muxiang Zhang