Sciweavers

275 search results - page 14 / 55
» Analysis of a Fair Exchange Protocol
Sort
View
ACISP
2008
Springer
15 years 1 months ago
Efficient One-Round Key Exchange in the Standard Model
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of...
Colin Boyd, Yvonne Cliff, Juan Manuel Gonzá...
AINA
2007
IEEE
15 years 6 months ago
Identity-Based and Inter-Domain Password Authenticated Key Exchange for Lightweight Clients
We propose a four-party password authenticated interdomain key exchange protocol which makes use of properties of identity-based cryptography and secret public keys. Being passwor...
Ford-Long Wong, Hoon Wei Lim
JDCTA
2010
150views more  JDCTA 2010»
14 years 6 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao
IQ
2000
15 years 1 months ago
Improving Information Quality in Loan Approval Processes for Fair Lending and Fair Pricing
: Current banking data management on loan approval processes has great room for improvements of information quality and prevention of data problems in general, but especially with ...
M. Cary Collins, Frank M. Guess
ISCC
2003
IEEE
113views Communications» more  ISCC 2003»
15 years 5 months ago
Channel Sharing of Competing Flows in Ad Hoc Networks
This paper studies the fairness with which competing flows share the channel in ad hoc networks using collision avoidance protocols. It is shown that the required multihop coordi...
Yu Wang, J. J. Garcia-Luna-Aceves