Sciweavers

45 search results - page 2 / 9
» A complete characterization of a family of key exchange prot...
Sort
View
ACNS
2010
Springer
200views Cryptology» more  ACNS 2010»
15 years 2 months ago
Deniable Internet Key Exchange
In this work, we develop a family of protocols for deniable Internet Key-Exchange (IKE) with the following properties: • Highly practical efficiency, and conceptual simplicity a...
Andrew Chi-Chih Yao, Yunlei Zhao
CRYPTO
2010
Springer
171views Cryptology» more  CRYPTO 2010»
14 years 10 months ago
Credential Authenticated Identification and Key Exchange
Secure two-party authentication and key exchange are fundamental problems. Traditionally, the parties authenticate each other by means of their identities, using a public-key infr...
Jan Camenisch, Nathalie Casati, Thomas Groß,...
75
Voted
AUTOMATICA
2002
81views more  AUTOMATICA 2002»
14 years 9 months ago
A convex approach to the characterization of the frequency response of ellipsoidal plants
This paper deals with the frequency domain properties of an ellipsoidal family of rational functions, i.e. a family of rational functions whose coefficients depend affinely on an ...
Graziano Chesi, Andrea Garulli, Alberto Tesi, Anto...
NDSS
2002
IEEE
15 years 2 months ago
Talking to Strangers: Authentication in Ad-Hoc Wireless Networks
In this paper we address the problem of secure communication and authentication in ad-hoc wireless networks. This is a difficult problem, as it involves bootstrapping trust betwe...
Dirk Balfanz, Diana K. Smetters, Paul Stewart, H. ...
97
Voted
PKC
2007
Springer
111views Cryptology» more  PKC 2007»
15 years 3 months ago
Optimistic Fair Exchange in a Multi-user Setting
: This paper addresses the security of optimistic fair exchange in a multi-user setting. While the security of public key encryption and public key signature schemes in a single-us...
Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum