Sciweavers

2947 search results - page 102 / 590
» The timely token protocol
Sort
View
ICC
2008
IEEE
166views Communications» more  ICC 2008»
15 years 11 months ago
Multi-Initiator Connected Dominating Set Construction for Mobile Ad Hoc Networks
— The connected dominating set (CDS) has been extensively used for routing and broadcast in mobile ad hoc networks. While existing CDS protocols are successful in constructing CD...
Kazuya Sakai, Fangyang Shen, Kyoung Min Kim, Min-T...
132
Voted
ASIACRYPT
1999
Springer
15 years 9 months ago
How to Prove That a Committed Number Is Prime
Abstract. The problem of proving a number is of a given arithmetic format with some prime elements, is raised in RSA undeniable signature, group signature and many other cryptograp...
Tri Van Le, Khanh Quoc Nguyen, Vijay Varadharajan
DATE
2009
IEEE
86views Hardware» more  DATE 2009»
15 years 11 months ago
A formal approach to design space exploration of protocol converters
In the field of chip design, hardware module reuse is a standard solution to the increasing complexity of chip architecture and the pressures to reduce time to market. In the abs...
Karin Avnit, Arcot Sowmya
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
15 years 11 months ago
The Rigorous Implementation of a Fair Exchange Protocol for Non-repudiable Web Service Interactions - a case study
The correct implementation of security protocols is a challenging task. To achieve a high degree of confidence in an implementation, as with any software, ideally one requires bot...
Nick Cook, Paul Robinson, Santosh K. Shrivastava
NCA
2005
IEEE
15 years 10 months ago
Controlling the Coverage of Grid Information Dissemination Protocols
Grid information dissemination protocols distribute information about the dynamic state of computational resources throughout interconnected wide area Grids. Performance metrics f...
Bhavin Gandhi, Sameer Tilak, Michael J. Lewis, Nae...