Sciweavers

35 search results - page 2 / 7
» scn 2008
Sort
View
SCN
2008
Springer
147views Communications» more  SCN 2008»
13 years 4 months ago
New Anonymity Notions for Identity-Based Encryption
ded abstract of this paper appeared in Proceedings of the 6th Conference on Security and Cryptography for Networks (SCN '08)
Malika Izabachène, David Pointcheval
SCN
2008
Springer
13 years 4 months ago
Early security key exchange for encryption in Mobile IPv6 handoff
Tin Yu Wu, Chi-Hsiang Lo, Han-Chieh Chao
SCN
2008
Springer
100views Communications» more  SCN 2008»
13 years 4 months ago
Using selective, short-term memory to improve resilience against DDoS exhaustion attacks
Qi Liao, David A. Cieslak, Aaron Striegel, Nitesh ...
SCN
2008
Springer
141views Communications» more  SCN 2008»
13 years 4 months ago
Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function
In 2004, Molnar and Wagner introduced a very appealing scheme dedicated to the identification of RFID tags. Their protocol relies on a binary tree of secrets which are shared
Julien Bringer, Hervé Chabanne, Thomas Icar...