Sciweavers

ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
13 years 6 months ago
An Authentication Scheme Based on the Twisted Conjugacy Problem
The conjugacy search problem in a group G is the problem of recovering an x G from given g G and h = x-1 gx. The alleged computational hardness of this problem in some groups was...
Vladimir Shpilrain, Alexander Ushakov
ACNS
2008
Springer
96views Cryptology» more  ACNS 2008»
13 years 6 months ago
Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns
Abstract. "Pairing" is referred to as the operation of achieving authenticated key agreement between two human-operated devices over a short- or medium-range wireless com...
Ramnath Prasad, Nitesh Saxena
ACNS
2008
Springer
106views Cryptology» more  ACNS 2008»
13 years 11 months ago
Dakota- Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography
Ivan Damgård, Lars R. Knudsen, Søren ...
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
13 years 11 months ago
Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance
Compliance storage is an increasingly important area for businesses faced with a myriad of new document retention regulations. Today, businesses have turned to Write-One Read Many ...
Nikita Borisov, Soumyadeb Mitra
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
13 years 11 months ago
Pushback for Overlay Networks: Protecting Against Malicious Insiders
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although resilient to external Denial of Service attacks, overlay networks can be render...
Angelos Stavrou, Michael E. Locasto, Angelos D. Ke...
ACNS
2008
Springer
115views Cryptology» more  ACNS 2008»
13 years 11 months ago
Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks
Abstract. What are the real security issues for a wireless sensor network (WSN) intended to monitor the structural health of a suspension bridge, a subway tunnel or a water distrib...
Frank Stajano, Daniel Cvrcek, Matt Lewis
ACNS
2008
Springer
115views Cryptology» more  ACNS 2008»
13 years 11 months ago
The Security of EPC Gen2 Compliant RFID Protocols
The increased functionality of EPC Class1 Gen2 (EPCGen2) is making this standard the de facto specification for inexpensive tags in the RFID industry. EPCGen2 supports only very b...
Mike Burmester, Breno de Medeiros
ACNS
2008
Springer
115views Cryptology» more  ACNS 2008»
13 years 11 months ago
Improved Conditional E-Payments
Abstract. Conditional e-cash or conditional e-payments have been introduced by Shi et al. as the means for enabling electronic payments to be based on the outcome of a certain cond...
Marina Blanton
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
13 years 11 months ago
PPAA: Peer-to-Peer Anonymous Authentication
In the pursuit of authentication schemes that balance user privacy and accountability, numerous anonymous credential systems have been constructed. However, existing systems assume...
Patrick P. Tsang, Sean W. Smith
ACNS
2008
Springer
132views Cryptology» more  ACNS 2008»
13 years 11 months ago
Generic Security-Amplifying Methods of Ordinary Digital Signatures
We describe two new paradigms on how to obtain ordinary signatures that are secure against existential forgery under adaptively chosen message attacks (fully-secure, in short), fro...
Jin Li, Kwangjo Kim, Fangguo Zhang, Duncan S. Wong