This paper discusses the strengths and weaknesses of non-monotonic-offers in alternating-offer bargaining protocol. It is commonly assumed that bargainers submit monotonic offers ...
Pinata Winoto, Gordon I. McCalla, Julita Vassileva
Dynamic group Diffie-Hellman protocols for Authenticated Key Exchange (AKE) are designed to work in a scenario in which the group membership is not known in advance but where parti...
Emmanuel Bresson, Olivier Chevassut, David Pointch...
- Security protocols, such as IPSec and SSL, are being increasingly deployed in the context of networked embedded systems. The resource-constrained nature of embedded systems and, ...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
We examine the combination of two directions in the field of privacy concerning computations over distributed private inputs – secure function evaluation (SFE) and differential...
Abstract— Opportunistic Networks (ONs) are a newly emerging type of Delay Tolerant Network (DTN) systems that opportunistically exploit unplanned contacts among nodes to share in...