Sciweavers

849 search results - page 97 / 170
» Evaluation of Security Protocols for the Session Initiation ...
Sort
View
78
Voted
SACRYPT
2005
Springer
109views Cryptology» more  SACRYPT 2005»
15 years 6 months ago
Reducing Time Complexity in RFID Systems
Radio frequency identification systems based on low-cost computing devices is the new plaything that every company would like to adopt. Its goal can be either to improve the produ...
Gildas Avoine, Etienne Dysli, Philippe Oechslin
111
Voted
ESAS
2006
Springer
15 years 4 months ago
So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks
Distance-bounding protocols aim to prevent an adversary from pretending that two parties are physically closer than they really are. We show that proposed distance-bounding protoco...
Jolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, ...
116
Voted
EUROCRYPT
1999
Springer
15 years 4 months ago
Secure Communication in Broadcast Channels: The Answer to Franklin and Wright's Question
Problems of secure communication and computation have been studied extensively in network models. Goldreich, Goldwasser, and Linial, Franklin and Yung, and Franklin and Wright have...
Yongge Wang, Yvo Desmedt
SASN
2003
ACM
15 years 5 months ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
106
Voted
WMASH
2005
ACM
15 years 6 months ago
Measurements of SIP signaling over 802.11b links
The Session Initiation Protocol (SIP) is a popular application-level signaling protocol that is used for a wide variety of applications such as session control and mobility handli...
Cristian Hesselman, Henk Eertink, Ing Widya, Erik ...