Sciweavers

741 search results - page 38 / 149
» Abstract Machines for Communication Security
Sort
View
SCN
2010
Springer
116views Communications» more  SCN 2010»
14 years 8 months ago
Provably Secure Convertible Undeniable Signatures with Unambiguity
Abstract. This paper shows some efficient and provably-secure convertible undeniable signature schemes (with both selective conversion and all conversion), in the standard model an...
Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata
CSL
1992
Springer
15 years 2 months ago
Communicating Evolving Algebras
We develop the rst steps of a theory of concurrency within the framework of evolving algebras of Gurevich, with the aim of investigating its suitability for the role of a general f...
Paola Glavan, Dean Rosenzweig
MA
2001
Springer
175views Communications» more  MA 2001»
15 years 2 months ago
Evaluating the Security of Three Java-Based Mobile Agent Systems
Abstract. The goal of mobile agent systems is to provide a distributed computing infrastructure supporting applications whose components can move between different execution enviro...
Sebastian Fischmeister, Giovanni Vigna, Richard A....
ISI
2008
Springer
14 years 10 months ago
Secure remote control model for information appliances
Abstract--Recently, Lee et al. proposed a Remote Authentication Model of Information Appliances (RAMIA). Unfortunately, RAMIA has a fatal error that opens the entire home network o...
Wen-Gong Shieh, Jian-Min Wang, Wen-Bing Horng
SECON
2007
IEEE
15 years 4 months ago
BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks
Abstract—In this work we identify vulnerabilities of ondemand multicast routing protocols for multi-hop wireless networks and discuss the challenges encountered in designing mech...
Reza Curtmola, Cristina Nita-Rotaru