Sciweavers

104 search results - page 21 / 21
» Modeling Key Compromise Impersonation Attacks on Group Key E...
Sort
View
CCS
2009
ACM
14 years 5 months ago
Authenticated wireless roaming via tunnels: making mobile guests feel at home
In wireless roaming a mobile device obtains a service from some foreign network while being registered for the similar service at its own home network. However, recent proposals tr...
Mark Manulis, Damien Leroy, François Koeune...
IANDC
2008
150views more  IANDC 2008»
13 years 4 months ago
Hierarchical combination of intruder theories
Recently automated deduction tools have proved to be very effective for detecting attacks on cryptographic protocols. These analysis can be improved, for finding more subtle weakn...
Yannick Chevalier, Michaël Rusinowitch
CRYPTO
2005
Springer
125views Cryptology» more  CRYPTO 2005»
13 years 10 months ago
Secure Computation Without Authentication
In the setting of secure multiparty computation, a set of parties wish to jointly compute some function of their inputs. Such a computation must preserve certain security propertie...
Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pa...
RAS
2008
108views more  RAS 2008»
13 years 4 months ago
Towards long-lived robot genes
Robot projects are often evolutionary dead ends, with the software and hardware they produce disappearing without trace afterwards. Common causes include dependencies on uncommon ...
Paul M. Fitzpatrick, Giorgio Metta, Lorenzo Natale