Sciweavers

30 search results - page 2 / 6
» Intrusion-Resilient Key Exchange in the Bounded Retrieval Mo...
Sort
View
IFM
2010
Springer
147views Formal Methods» more  IFM 2010»
13 years 3 months ago
Symbolic Model-Checking of Optimistic Replication Algorithms
Abstract. The Operational Transformation (OT) approach, used in many collaborative editors, allows a group of users to concurrently update replicas of a shared object and exchange ...
Hanifa Boucheneb, Abdessamad Imine, Manal Najem
IACR
2011
221views more  IACR 2011»
12 years 5 months ago
A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
Abstract. Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purpose...
Süleyman Kardas, Mehmet Sabir Kiraz, Muhammed...
CRYPTO
2007
Springer
145views Cryptology» more  CRYPTO 2007»
13 years 9 months ago
Secure Identification and QKD in the Bounded-Quantum-Storage Model
We consider the problem of secure identification: user U proves to server S that he knows an agreed (possibly low-entropy) password w, while giving away as little information on w ...
Ivan Damgård, Serge Fehr, Louis Salvail, Chr...
IFIP
2010
Springer
13 years 18 days ago
Bounded Memory Dolev-Yao Adversaries in Collaborative Systems
Abstract. This paper extends existing models for collaborative systems. We investigate how much damage can be done by insiders alone, without collusion with an outside adversary. I...
Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, ...
RIAO
2007
13 years 7 months ago
Collective Annotation: Perspectives for Information Retrieval Improvement
Nowadays we enter the Web 2.0 era where people’s participation is a key principle. In this context, collective annotations enable to share and discuss readers’ feedback with r...
Guillaume Cabanac, Max Chevalier, Claude Chrisment...