Sciweavers

IJISEC
2002
58views more  IJISEC 2002»
13 years 4 months ago
A complete characterization of a family of key exchange protocols
Using a random deal of cards to players and a computationally unlimited eavesdropper, all players wish to share a one-bit secret key which is informationtheoretically secure from t...
Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki
IJISEC
2002
52views more  IJISEC 2002»
13 years 4 months ago
Securing SOAP e-services
Remote service invocation via HTTP and XML promises to become an important component of the Internet infrastructure. Work is ongoing in the W3C XML Protocol Working Group to define...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
IJISEC
2002
86views more  IJISEC 2002»
13 years 4 months ago
Using AVL trees for fault-tolerant group key management
In this paper we describe an efficient algorithm for the management of group-keys for Group Communication Systems. Our algorithm is based on the notion of key-graphs, previously u...
Ohad Rodeh, Kenneth P. Birman, Danny Dolev