Sciweavers

211 search results - page 2 / 43
» A Message Recognition Protocol Based on Standard Assumptions
Sort
View
CANS
2008
Springer
126views Cryptology» more  CANS 2008»
13 years 7 months ago
A New Message Recognition Protocol for Ad Hoc Pervasive Networks
We propose a message recognition protocol which is suitable for ad hoc pervasive networks without the use of hash chains. Hence, we no longer require the devices to save values of ...
Atefeh Mashatan, Douglas R. Stinson
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
12 years 8 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
EURONGI
2004
Springer
13 years 10 months ago
A Family of Encounter-Based Broadcast Protocols for Mobile Ad-Hoc Networks
A family of message propagation protocols for highly mobile ad-hoc networks is defined, and is studied analytically and by simulation. The coverage of a message (the fraction of n...
Dave E. Cooper, Paul D. Ezhilchelvan, Isi Mitrani
CCS
1999
ACM
13 years 9 months ago
Signature Schemes Based on the Strong RSA Assumption
We describe and analyze a new digital signature scheme. The new scheme is quite efficient, does not require the the signer to maintain any state, and can be proven secure against ...
Ronald Cramer, Victor Shoup
ICCNMC
2005
Springer
13 years 10 months ago
Simplified Message Transformation for Optimization of Message Processing in 3G-324M Control Protocol
3G-324M is a multimedia transmission protocol designed for 3G communication environment. Meanwhile H.245 standard is a control protocol in 3G-324M and gives specific descriptions a...
Man-Ching Yuen, Ji Shen, Weijia Jia, Bo Han