Sciweavers

2108 search results - page 229 / 422
» Encrypted
Sort
View
184
Voted
WOA
2010
15 years 1 months ago
Using Mobile Agents for Secure Biometric Authentication
This paper deals with the definition of a strong authentication model, coupling usual password/PIN based methods with a biometric matching, over a Multi Agent distributed infrastru...
Marco Tranquillin, Carlo Ferrari, Michele Moro
IJNSEC
2011
167views more  IJNSEC 2011»
14 years 11 months ago
New Real Time Multicast Authentication Protocol
Multicast gives professional large-scale content distribution by providing an efficient transport mechanism for one-to-many and many-to-many communications. There is a number of s...
Riham Abdellatif, Heba Kamal Aslan, Salwa H. Elram...
142
Voted
IFIP
2010
Springer
14 years 11 months ago
Efficient Decision Procedures for Message Deducibility and Static Equivalence
Abstract. We consider two standard notions in formal security protocol analysis: message deducibility and static equivalence under equational theories. We present polynomial-time a...
Bruno Conchinha, David A. Basin, Carlos Caleiro
IJNSEC
2010
120views more  IJNSEC 2010»
14 years 11 months ago
Secure Group Key Management Scheme for Multicast Networks
This paper proposes a scheme to provide security to dynamic multicast VoIP systems efficiently. Security is usually provided by encrypting the media packets sent from a user to ot...
R. Srinivasan, V. Vaidehi, R. Rajaraman, S. Kanaga...
141
Voted
IACR
2011
136views more  IACR 2011»
14 years 3 months ago
Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller
We give new methods for generating and using “strong trapdoors” in cryptographic lattices, which are simultaneously simple, efficient, easy to implement (even in parallel), a...
Daniele Micciancio, Chris Peikert