Sciweavers

1653 search results - page 119 / 331
» Timed analysis of security protocols
Sort
View
CIS
2004
Springer
15 years 8 months ago
General Public Key m-Out-of-n Oblivious Transfer
Abstract. In the m-out-of-n oblivious transfer model, Alice has n messages, Bob has m choices. After the interaction between the two parties, Bob can get m but only m messages from...
Zhide Chen, Hong Zhu
NETWORKING
2007
15 years 4 months ago
Simple Models for the Performance Evaluation of a Class of Two-Hop Relay Protocols
We evaluate the performance of a class of two-hop relay protocols for mobile ad hoc networks. The interest is on the multicopy two-hop relay (MTR) protocol, where the source may ge...
Ahmad Al Hanbali, Arzad Alam Kherani, Philippe Nai...
SFM
2004
Springer
15 years 8 months ago
Embedded Software Analysis with MOTOR
This paper surveys the language Modest, a Modelling and Description language for Stochastic and Timed systems, and its accompanying tool-environment MOTOR. The language and tool ar...
Joost-Pieter Katoen, Henrik C. Bohnenkamp, Ric Kla...
116
Voted
DAGSTUHL
2007
15 years 4 months ago
Civitas: A Secure Remote Voting System
Civitas is the first implementation of a coercion-resistant, universally verifiable, remote voting scheme. This paper describes the design of Civitas, details the cryptographic ...
Michael E. Clarkson, Stephen Chong, Andrew C. Myer...
COMCOM
2002
99views more  COMCOM 2002»
15 years 3 months ago
TCP performance analysis and optimization over DMT based ADSL system
This paper studies the transmission control protocol (TCP) performance over a discrete multi-tone (DMT) based asymmetric digital subscriber loop (ADSL) network. The impact of DMT ...
Xiaoning He, Hao Che