Sciweavers

47 search results - page 3 / 10
» Analysis of the HIP Base Exchange Protocol
Sort
View
ICISC
2009
169views Cryptology» more  ICISC 2009»
13 years 3 months ago
Generic One Round Group Key Exchange in the Standard Model
Minimizing complexity of group key exchange (GKE) protocols is an important milestone towards their practical deployment. An interesting approach to achieve this goal is to simplif...
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonz...
ICIP
2006
IEEE
14 years 7 months ago
CLIX: Network Coding and Cross Layer Information Exchange of Wireless Video
Network Coding (NC) can be efficiently combined with the "physical layer broadcast" property of wireless mediums to facilitate mutual exchange of independent information...
Shirish S. Karande, Kiran Misra, Hayder Radha
WKDD
2010
CPS
217views Data Mining» more  WKDD 2010»
14 years 22 days ago
Two-round Multi-Party Contract Signing
—A multi-party contract signing (MPCS) protocol allows a set of parties to exchange messages with each other to reach a state in which either each of them has a pre-agreed contra...
Xiangdong Li, Qiusheng Zheng
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
12 years 9 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
ICCSA
2005
Springer
13 years 11 months ago
A Formal Analysis of Fairness and Non-repudiation in the RSA-CEGD Protocol
Recently, Nenadi´c et al. (2004) proposed the RSA-CEGD protocol for certified delivery of e-goods. This is a relatively complex scheme based on verifiable and recoverable encryp...
Almudena Alcaide, Juan M. Estévez-Tapiador,...