Voting schemes that provide receipt-freeness prevent voters from proving their cast vote, and hence thwart vote-buying and coercion. We analyze the security of the multi-authority ...
The theory of latency insensitive design is presented as the foundation of a new correct by construction methodology to design very large digital systems by assembling blocks of In...
Luca P. Carloni, Kenneth L. McMillan, Alberto L. S...
Abstract— Although the SIP protocol claims a complete dualstack support, some aspects, such as interoperability between different address realms and support for multi-homed hosts...
IEEE 802.11 Distributed Coordination Function (DCF) guarantees fair transmission opportunity to stations. Channel occupation of low rate stations in IEEE 802.11 Wireless Local Area...
Underwater wireless sensor networks consist of a certain number of sensors and vehicles that interact to collect data and perform collaborative tasks. Designing energy-efficient r...