Sciweavers

65 search results - page 5 / 13
» Deniable Key Exchanges for Secure Messaging
Sort
View
ICICS
2010
Springer
13 years 4 months ago
Efficient Authentication for Mobile and Pervasive Computing
With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of su...
Basel Alomair, Radha Poovendran
IJNSEC
2006
78views more  IJNSEC 2006»
13 years 6 months ago
Authentication and Key Agreement Protocols Preserving Anonymity
Anonymity is a very important security feature in addition to authentication and key agreement features in communication protocols. In this paper, we propose two authentication an...
Kumar V. Mangipudi, Rajendra S. Katti, Huirong Fu
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
12 years 9 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal
SERVICES
2008
71views more  SERVICES 2008»
13 years 7 months ago
Identifying Opportunities for Web Services Security Performance Optimizations
WS-Security is an essential component of the Web services protocol stack. WS-Security provides end-to-end security properties, thereby assuring the participation of nonsecure tran...
Robert A. van Engelen, Wei Zhang
FC
2006
Springer
99views Cryptology» more  FC 2006»
13 years 10 months ago
A Protocol for Secure Public Instant Messaging
Although Instant Messaging (IM) services are now relatively long-standing and very popular as an instant way of communication over the Internet, they have received little attention...
Mohammad Mannan, Paul C. van Oorschot