Sciweavers

1825 search results - page 45 / 365
» Cryptographic Securities Exchanges
Sort
View
SCN
2008
Springer
15 years 2 months ago
Early security key exchange for encryption in Mobile IPv6 handoff
Tin Yu Wu, Chi-Hsiang Lo, Han-Chieh Chao
144
Voted
WWW
2005
ACM
16 years 4 months ago
An abuse-free fair contract signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
129
Voted
TIFS
2010
186views more  TIFS 2010»
15 years 1 months ago
An abuse-free fair contract-signing protocol based on the RSA signature
A fair contract signing protocol allows two potentially mistrusted parities to exchange their commitments (i.e., digital signatures) to an agreed contract over the Internet in a f...
Guilin Wang
156
Voted
ATC
2007
Springer
15 years 9 months ago
Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust
Group key exchange protocols allow their participants to compute a secret key which can be used to ensure security and privacy for various multi-party applications. The resulting g...
Emmanuel Bresson, Mark Manulis
121
Voted
CHES
2010
Springer
133views Cryptology» more  CHES 2010»
15 years 4 months ago
ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware
This paper describes and analyzes the security of a general-purpose cryptographic function design, with application in RFID tags and sensor networks. Based on these analyzes, we su...
Stéphane Badel, Nilay Dagtekin, Jorge Nakah...