Sciweavers

2947 search results - page 13 / 590
» The timely token protocol
Sort
View
COLCOM
2005
IEEE
15 years 5 months ago
"Token" equilibria in sensor networks with multiple sponsors
When two sponsoring organizations, working towards separate goals, can employ wireless sensor networks for a finite period of time, it can be efficiency-enhancing for the sponso...
David A. Miller, Sameer Tilak, Tony Fountain
CRYPTO
2011
Springer
180views Cryptology» more  CRYPTO 2011»
13 years 11 months ago
Leakage-Resilient Zero Knowledge
In this paper, we initiate a study of zero knowledge proof systems in the presence of sidechannel attacks. Specifically, we consider a setting where a cheating verifier is allow...
Sanjam Garg, Abhishek Jain 0002, Amit Sahai
JUCS
2008
113views more  JUCS 2008»
14 years 11 months ago
Enhancing ZRTP by using Computational Puzzles
Abstract: In this paper we present and discuss a new approach for securing multimedia communication, which is based on three innovations. The first innovation is the integration of...
Helmut Hlavacs, Wilfried N. Gansterer, Hannes Scha...
ICC
1997
IEEE
158views Communications» more  ICC 1997»
15 years 4 months ago
The Priority Token Bank in a Network of Queues
This paper takes a known approach for scheduling and admission control in integrated services networks1 , the Priority Token Bank (PTB), whose mechanism and performance have been ...
Mark A. Lynn, Jon M. Peha
IAAI
2001
15 years 1 months ago
Token Allocation Strategy for Free-Flight Conflict Solving
For the last 10 years, airlines have widely supported research on the development of airspaces where aircraft would be free to decide their trajectory: these areas where called Fr...
Géraud Granger, Nicolas Durand, Jean-Marc A...