Sciweavers

275 search results - page 13 / 55
» Analysis of a Fair Exchange Protocol
Sort
View
ADT
2010
14 years 11 months ago
Fair data collection in wireless sensor networks: analysis and protocol
Md. Abdul Hamid, Muhammad Mahbub Alam, Md. Sharifu...
PKC
2009
Springer
129views Cryptology» more  PKC 2009»
16 years 7 days ago
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed unde...
Colin Boyd, Juan Manuel González Nieto, M. ...
WWW
2005
ACM
16 years 11 days ago
An abuse-free fair contract signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
TIFS
2010
186views more  TIFS 2010»
14 years 10 months ago
An abuse-free fair contract-signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang