Sciweavers

849 search results - page 35 / 170
» Evaluation of Security Protocols for the Session Initiation ...
Sort
View
102
Voted
CCS
2010
ACM
15 years 20 days ago
A new framework for efficient password-based authenticated key exchange
Protocols for password-based authenticated key exchange (PAKE) allow two users who share only a short, low-entropy password to agree on a cryptographically strong session key. The...
Adam Groce, Jonathan Katz
108
Voted
SIGMOD
2004
ACM
133views Database» more  SIGMOD 2004»
16 years 19 days ago
Robust key establishment in sensor networks
Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research problem since asymmetric key cryptosy...
Yongge Wang
102
Voted
FC
2010
Springer
145views Cryptology» more  FC 2010»
14 years 11 months ago
Cryptographic Protocol Analysis of AN.ON
This work presents a cryptographic analysis of AN.ON’s anonymization protocols. We have discovered three flaws of differing severity. The first is caused by the fact that the ...
Benedikt Westermann, Rolf Wendolsky, Lexi Pimenidi...
CRYPTO
2010
Springer
167views Cryptology» more  CRYPTO 2010»
15 years 1 months ago
Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost
Multiparty computation protocols have been known for more than twenty years now, but due to their lack of efficiency their use is still limited in real-world applications: the goal...
Ivan Damgård, Claudio Orlandi
135
Voted
ENTCS
2007
131views more  ENTCS 2007»
15 years 13 days ago
Secure Node Discovery in Ad-hoc Networks and Applications
Designing secure protocols over ad-hoc networks has proved to be a very challenging task, due to various features of such networks, such as partial connectivity, node mobility, an...
Giovanni Di Crescenzo