Sciweavers

1825 search results - page 257 / 365
» Cryptographic Securities Exchanges
Sort
View
COMSWARE
2006
IEEE
15 years 9 months ago
Trust-propagation based authentication protocol in multihop wireless home networks
Abstract— In this paper, we propose an authentication and secure channel establishment protocol that is reliable and adaptable for multihop wireless home networks. The main idea ...
Han Sang Kim, Jin Wook Lee, Sandeep K. S. Gupta, Y...
ADHOCNOW
2006
Springer
15 years 9 months ago
Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks
Recently, identity-based cryptographic (IBC) schemes have been considered to secure mobile ad hoc networks (MANETs) due to their efficient key management properties. However, propo...
Katrin Hoeper, Guang Gong
CCS
2005
ACM
15 years 8 months ago
Provable anonymity
This paper provides a formal framework for the analysis of information hiding properties of anonymous communication protocols in terms of epistemic logic. The key ingredient is ou...
Flavio D. Garcia, Ichiro Hasuo, Wolter Pieters, Pe...
CISC
2005
Springer
116views Cryptology» more  CISC 2005»
15 years 8 months ago
Specifying Authentication Using Signal Events in CSP
The formal analysis of cryptographic protocols has developed into a comprehensive body of knowledge, building on a wide variety of formalisms and treating a diverse range of securi...
Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider
FC
2005
Springer
110views Cryptology» more  FC 2005»
15 years 8 months ago
Approximate Message Authentication and Biometric Entity Authentication
Approximate Message Authentication Code (AMAC) is a recently introduced cryptographic primitive with several applications in the areas of cryptography and coding theory. Briefly s...
Giovanni Di Crescenzo, R. F. Graveman, Renwei Ge, ...