Sciweavers

65 search results - page 9 / 13
» Deniable Key Exchanges for Secure Messaging
Sort
View
DBSEC
2003
157views Database» more  DBSEC 2003»
14 years 11 months ago
Systematic Development of a Family of Fair Exchange Protocols
: Fair exchange protocols play an important role in application areas such as e-commerce where protocol participants require mutual guarantees that a transaction involving exchange...
Paul D. Ezhilchelvan, Santosh K. Shrivastava
ISPDC
2010
IEEE
14 years 8 months ago
SKAIT: A Parameterized Key Assignment Scheme for Wireless Networks
—In this paper, we propose SKAIT, a parameterized symmetric key pre-distribution scheme that guarantees a secure and confidential channel between every pair of nodes in a wirele...
Ramon Novales, Neeraj Mittal, Kamil Saraç
76
Voted
SP
2006
IEEE
109views Security Privacy» more  SP 2006»
15 years 3 months ago
Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g., it is possible to change a bit “0” into a bi...
Mario Cagalj, Jean-Pierre Hubaux, Srdjan Capkun, R...
CTRSA
2006
Springer
140views Cryptology» more  CTRSA 2006»
15 years 1 months ago
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators
Bellare, Canetti and Krawczyk proposed a security model (BCK-model) for authentication and key exchange protocols in 1998. The model not only reasonably captures the power of pract...
Xiaojian Tian, Duncan S. Wong
ICOIN
2001
Springer
15 years 2 months ago
Integrated Transport Layer Security: End-to-End Security Model between WTLS and TLS
WAP is a set of protocols that optimizes standard TCP/IP/HTTP/HTML protocols, for use under the low bandwidth, high latency conditions often found in wireless networks. But, end-t...
Eun-Kyeong Kwon, Yong-Gu Cho, Ki-Joon Chae