Sciweavers

Share
SCN
2010
Springer
120views Communications» more  SCN 2010»
8 years 3 months ago
Identity crisis: on the problem of namespace design for ID-PKC and MANETs
In this paper we explore the "interface" between Identity-based Public Key Cryptography (ID-PKC) and Mobile Ad-hoc Networks (MANETs). In particular we examine the problem...
Shane Balfe, Andrew D. McDonald, Kenneth G. Paters...
SCN
2010
Springer
145views Communications» more  SCN 2010»
8 years 3 months ago
A guide to trust in mobile ad hoc networks
In this paper we examine issues of trust and reputation in Mobile Ad hoc Networks. We look at a number of the trust and reputation models that have been proposed and we highlight o...
Shane Balfe, Po-Wah Yau, Kenneth G. Paterson
SCN
2010
Springer
124views Communications» more  SCN 2010»
8 years 6 months ago
Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption
At Asiacrypt 2009, Kurosawa and Nojima showed a fully simulatable adaptive oblivious transfer (OT) protocol under the DDH assumption in the standard model. However, Green and Hohen...
Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
SCN
2010
Springer
232views Communications» more  SCN 2010»
8 years 6 months ago
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model
Serge Vaudenay [20] introduced a notion of Message Authentication (MA) protocols in the Short Authenticated String (SAS) model. A SAS-MA protocol authenticates arbitrarily long mes...
Stanislaw Jarecki, Nitesh Saxena
SCN
2010
Springer
132views Communications» more  SCN 2010»
8 years 6 months ago
Solving Revocation with Efficient Update of Anonymous Credentials
Anonymous credential system promise efficient, ubiquitous access to digital services while preserving user privacy. However, their diffusion is impaired by the lack of efficient re...
Jan Camenisch, Markulf Kohlweiss, Claudio Soriente
SCN
2010
Springer
163views Communications» more  SCN 2010»
8 years 6 months ago
Time-Specific Encryption
This paper introduces and explores the new concept of Time-Specific Encryption (TSE). In (Plain) TSE, a Time Server broadcasts a key at the beginning of each time unit, a Time Inst...
Kenneth G. Paterson, Elizabeth A. Quaglia
SCN
2010
Springer
113views Communications» more  SCN 2010»
8 years 6 months ago
Public-Key Encryption with Efficient Amortized Updates
Nishanth Chandran, Rafail Ostrovsky, William E. Sk...
SCN
2010
Springer
109views Communications» more  SCN 2010»
8 years 6 months ago
malnets: large-scale malicious networks via compromised wireless access points
Patrick Traynor, Kevin R. B. Butler, William Enck,...
books