Sciweavers

849 search results - page 55 / 170
» Evaluation of Security Protocols for the Session Initiation ...
Sort
View
80
Voted
EUROCRYPT
2009
Springer
16 years 1 months ago
On the Portability of Generalized Schnorr Proofs
The notion of Zero Knowledge Proofs (of knowledge) [ZKP] is central to cryptography; it provides a set of security properties that proved indispensable in concrete protocol design...
Jan Camenisch, Aggelos Kiayias, Moti Yung
DSONLINE
2006
108views more  DSONLINE 2006»
15 years 17 days ago
Middleware for Protocol-Based Coordination in Mobile Applications
We propose extending these middleware approaches with suitable abstractions to better support protocolbased interaction in mobile applications. To test our approach, we created Obj...
Kurt Schelfthout, Danny Weyns, Tom Holvoet
99
Voted
IACR
2011
94views more  IACR 2011»
14 years 5 days ago
Secure Computation with Sublinear Amortized Work
Traditional approaches to secure computation begin by representing the function f being computed as a circuit. For any function f that depends on each of its inputs, this implies ...
S. Dov Gordon, Jonathan Katz, Vladimir Kolesnikov,...
ENTCS
2008
390views more  ENTCS 2008»
14 years 11 months ago
Cryptographic Versus Trust-based Methods for MANET Routing Security
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues ...
Jared Cordasco, Susanne Wetzel
85
Voted
IWQOS
2001
Springer
15 years 5 months ago
Experimental Extensions to RSVP - Remote Client and One-Pass Signalling
We present and evaluate two experimental extensions to RSVP in terms of protocol specification and implementation. These extensions are targeted at apparent shortcomings of RSVP to...
Martin Karsten