Sciweavers

9503 search results - page 78 / 1901
» Authenticated System Calls
Sort
View
IJNSEC
2007
126views more  IJNSEC 2007»
15 years 4 months ago
Elliptic Curve Cryptography Based Wireless Authentication Protocol
Recently, Aydos et al. proposed an ECC-based wireless authentication protocol. Because their protocol is based on ECC, the protocol has significant advantage including lower comp...
Yongliang Liu, Wen Gao, Hongxun Yao, Xinghua Yu
STOC
2002
ACM
159views Algorithms» more  STOC 2002»
16 years 5 months ago
On the composition of authenticated byzantine agreement
A fundamental problem of distributed computing is that of simulating a secure broadcast channel, within the setting of a point-to-point network. This problem is known as Byzantine...
Yehuda Lindell, Anna Lysyanskaya, Tal Rabin
IJNSEC
2008
120views more  IJNSEC 2008»
15 years 4 months ago
Efficient Identity-based Authenticated Key Agreement Protocol with PKG Forward Secrecy
For an identity-based authenticated key agreement (IDAK) protocol, PKG forward secrecy is the strongest notion of forward secrecy, which is about the security of previously establ...
Shengbao Wang, Zhenfu Cao, Feng Cao
CTRSA
2009
Springer
142views Cryptology» more  CTRSA 2009»
15 years 11 months ago
Attacks on the DECT Authentication Mechanisms
Digital Enhanced Cordless Telecommunications (DECT) is a standard for connecting cordless telephones to a fixed telecommunications network over a short range. The cryptographic al...
Stefan Lucks, Andreas Schuler, Erik Tews, Ralf-Phi...
NETWORKING
2004
15 years 6 months ago
Efficient, Authenticated, and Fault-Tolerant Key Agreement for Dynamic Peer Groups
We present an efficient authenticated and fault-tolerant protocol (AFTD) for tree-based key agreement. Our approach is driven by the insight that when a Diffie-Hellman blinded key ...
Li Zhou, Chinya V. Ravishankar