Sciweavers

9 search results - page 1 / 2
» Secret Handshakes with Revocation Support
Sort
View
ICISC
2009
120views Cryptology» more  ICISC 2009»
13 years 3 months ago
Secret Handshakes with Revocation Support
Alessandro Sorniotti, Refik Molva
NDSS
2007
IEEE
13 years 11 months ago
Secret Handshakes with Dynamic and Fuzzy Matching
The need for communication privacy over public networks is of growing concern in today’s society. As a result, privacy-preserving authentication and key exchange protocols have ...
Giuseppe Ateniese, Jonathan Kirsch, Marina Blanton
SP
2003
IEEE
136views Security Privacy» more  SP 2003»
13 years 10 months ago
Secret Handshakes from Pairing-Based Key Agreements
Consider a CIA agent who wants to authenticate herself to a server, but does not want to reveal her CIA credentials unless the server is a genuine CIA outlet. Consider also that t...
Dirk Balfanz, Glenn Durfee, Narendar Shankar, Dian...
ACNS
2011
Springer
237views Cryptology» more  ACNS 2011»
12 years 8 months ago
Private Discovery of Common Social Contacts
The increasing use of computing devices for social interactions propels the proliferation of online social applications, yet, it prompts a number of privacy concerns. One common p...
Emiliano De Cristofaro, Mark Manulis, Bertram Poet...
CCS
2007
ACM
13 years 11 months ago
Hardware-rooted trust for secure key management and transient trust
We propose minimalist new hardware additions to a microprocessor chip that protect cryptographic keys in portable computing devices which are used in the field but owned by a cen...
Jeffrey S. Dwoskin, Ruby B. Lee