Sciweavers

252 search results - page 1 / 51
» Computationally secure two-round authenticated message excha...
Sort
View
CRYPTO
2006
Springer
159views Cryptology» more  CRYPTO 2006»
13 years 8 months ago
Asymptotically Optimal Two-Round Perfectly Secure Message Transmission
Abstract. The problem of perfectly secure message transmission concerns two synchronized non-faulty processors sender (S) and receiver (R) that are connected by a synchronous netwo...
Saurabh Agarwal, Ronald Cramer, Robbert de Haan
CRYPTO
2007
Springer
162views Cryptology» more  CRYPTO 2007»
13 years 11 months ago
Universally-Composable Two-Party Computation in Two Rounds
Round complexity is a central measure of efficiency, and characterizing the round complexity of various cryptographic tasks is of both theoretical and practical importance. We show...
Omer Horvitz, Jonathan Katz
CCS
2010
ACM
13 years 11 months ago
Computationally secure two-round authenticated message exchange
Klaas Ole Kürtz, Henning Schnoor, Thomas Wilk...
ICICS
2010
Springer
13 years 2 months ago
Efficient Authentication for Mobile and Pervasive Computing
With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of su...
Basel Alomair, Radha Poovendran
ADHOC
2007
134views more  ADHOC 2007»
13 years 4 months ago
Threshold password authentication against guessing attacks in Ad hoc networks
Password authentication has been accepted as one of the commonly used solutions in network environment to protect resources from unauthorized access. The emerging mobile Ad hoc ne...
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu