Sciweavers

107 search results - page 3 / 22
» An Extensible Platform for Evaluating Security Protocols
Sort
View
FC
2008
Springer
134views Cryptology» more  FC 2008»
13 years 7 months ago
Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents
Oblivious transfer (OT) is a fundamental primitive used in many cryptographic protocols, including general secure function evaluation (SFE) protocols. However, interaction is a pri...
Vandana Gunupudi, Stephen R. Tate
ADHOCNOW
2008
Springer
13 years 12 months ago
A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks
The development of Wireless Body Area Networks (WBANs) for wireless sensing and monitoring of a person’s vital functions, is an enabler in providing better personal health care w...
Dave Singelée, Benoît Latré, B...
INFORMATIKTAGE
2008
13 years 7 months ago
Practical Secure Function Evaluation
: This thesis focuses on the practical aspects of general two-party Secure Function Evaluation (SFE). A new SFE protocol that allows free evaluation of XOR gates and is provably se...
Thomas Schneider 0003
MASS
2010
156views Communications» more  MASS 2010»
13 years 3 months ago
On application of Host Identity Protocol in wireless sensor networks
Recent advances in development of low-cost wireless sensor platforms open up opportunities for novel wireless sensor network (WSN) applications. Likewise emerge security concerns o...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov
CONEXT
2008
ACM
13 years 7 months ago
TDM MAC protocol design and implementation for wireless mesh networks
We present the design, implementation, and evaluation of a Time Division Multiplex (TDM) MAC protocol for multihop wireless mesh networks using a programmable wireless platform. E...
Dimitrios Koutsonikolas, Theodoros Salonidis, Henr...