Results 171 to 180 of about 4,817 (211)
Some of the next articles are maybe not open access.
Evaluating Cryptographic Protocols
1993Cryptographic Protocol (CP) analysis is a topic of intense research. Meadows describes four approaches for CP verification under investigation in [MEA92] and several authors have categorized protocols based on types of errors they are subject to [BIRD92], [SYV93a],[SYV93b].
openaire +1 more source
Cryptographic protocols and voting
1994Three protocols related to computer voting are presented. First protocol is an efficient ANDOS protocol which is based on a natural cryptographic assumption. The other two protocols attack a difficult problem in computer voting: buying of votes. We manage to solve this problem but our protocols are impractical in large-scale elections.
Valtteri Niemi, Ari Renvall
openaire +1 more source
A Survey of Routing Protocols for Underwater Wireless Sensor Networks
IEEE Communications Surveys and Tutorials, 2021Junhai Luo
exaly
Energy-Efficient Routing Protocols in Wireless Sensor Networks: A Survey
IEEE Communications Surveys and Tutorials, 2013Dimitrios D Vergados
exaly

