Sciweavers

1853 search results - page 85 / 371
» Cryptographic Protocols and Network Security
Sort
View
CORR
2010
Springer
83views Education» more  CORR 2010»
14 years 11 months ago
A Platform for Implementing Secure Wireless Ad Hoc Networks
: We propose a new platform for implementing secure wireless ad hoc networks. Our proposal is based on a modular architecture, with the software stack constructed directly on the E...
Gyula Farkas, Béla Genge, Piroska Haller
IWSEC
2009
Springer
15 years 6 months ago
Reducing Complexity Assumptions for Oblivious Transfer
Reducing the minimum assumptions needed to construct various cryptographic primitives is an important and interesting task in theoretical cryptography. Oblivious Transfer, one of ...
K. Y. Cheong, Takeshi Koshiba
FSTTCS
2006
Springer
15 years 3 months ago
Computationally Sound Symbolic Secrecy in the Presence of Hash Functions
The standard symbolic, deducibility-based notions of secrecy are in general insufficient from a cryptographic point of view, especially in presence of hash functions. In this paper...
Véronique Cortier, Steve Kremer, Ralf K&uum...
MOBIHOC
2006
ACM
15 years 11 months ago
SDAP: : a secure hop-by-Hop data aggregation protocol for sensor networks
Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao
ASIACRYPT
2008
Springer
15 years 1 months ago
Limits of Constructive Security Proofs
The collision-resistance of hash functions is an important foundation of many cryptographic protocols. Formally, collision-resistance can only be expected if the hash function in f...
Michael Backes, Dominique Unruh