Sciweavers

1853 search results - page 33 / 371
» Cryptographic Protocols and Network Security
Sort
View
CN
2006
117views more  CN 2006»
14 years 12 months ago
Using equivalence-checking to verify robustness to denial of service
In this paper, we introduce a new security property which intends to capture the ability of a cryptographic protocol being resistant to denial of service. This property, called im...
Stéphane Lafrance
WIMOB
2008
IEEE
15 years 6 months ago
Securing Dynamic Home Agent Address Discovery with Cryptographically Generated Addresses and RSA Signatures
With Dynamic Home Agent Address Discovery (DHAAD), as specified in Mobile IPv6, a Mobile Node can discover the address of a suitable Home Agent on the home link. However, DHAAD suf...
Christian Bauer, Max Ehammer
WWW
2005
ACM
16 years 14 days ago
An abuse-free fair contract signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
TIFS
2010
186views more  TIFS 2010»
14 years 10 months ago
An abuse-free fair contract-signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
IJNSEC
2006
56views more  IJNSEC 2006»
14 years 11 months ago
New Class of Cryptographic Primitives and Cipher Design for Networks Security
Nikolay A. Moldovyan, Alexander A. Moldovyan, Ma A...