Sciweavers

8 search results - page 2 / 2
» Fast Cut-and-Choose-Based Protocols for Malicious and Covert...
Sort
View
PKC
2010
Springer
148views Cryptology» more  PKC 2010»
13 years 10 months ago
On the Feasibility of Consistent Computations
In many practical settings, participants are willing to deviate from the protocol only if they remain undetected. Aumann and Lindell introduced a concept of covert adversaries to f...
Sven Laur, Helger Lipmaa
JSAC
2006
136views more  JSAC 2006»
13 years 6 months ago
Secure data communication in mobile ad hoc networks
We address the problem of secure and fault-tolerant communication in the presence of adversaries across a multihop wireless network with frequently changing topology. To effectivel...
Panagiotis Papadimitratos, Zygmunt J. Haas
NDSS
2005
IEEE
13 years 11 months ago
DNS-based Detection of Scanning Worms in an Enterprise Network
Worms are arguably the most serious security threat facing the Internet. Seeking a detection technique that is both sufficiently efficient and accurate to enable automatic conta...
David Whyte, Evangelos Kranakis, Paul C. van Oorsc...