Sciweavers

3751 search results - page 151 / 751
» Events in security protocols
Sort
View
ACNS
2007
Springer
105views Cryptology» more  ACNS 2007»
15 years 4 months ago
Analyzing an Electronic Cash Protocol Using Applied Pi Calculus
Abstract. Untraceability and unreuseability are essential security properties for electronic cash protocols. Many protocols have been proposed to meet these two properties. However...
Zhengqin Luo, Xiaojuan Cai, Jun Pang, Yuxin Deng
57
Voted
JSS
2006
65views more  JSS 2006»
14 years 10 months ago
Cryptanalysis of a hybrid authentication protocol for large mobile networks
In this paper we analyse a hybrid authentication protocol due to Chien and Jan, designed for use in large mobile networks. The proposed protocol consists of two sub-protocols, nam...
Qiang Tang, Chris J. Mitchell
ACSAC
1998
IEEE
15 years 2 months ago
Electronic Submission Protocol Based on Temporal Accountability
This paper describes various possible attacks on temporal properties such as temporal records of payment times and declarations of the closing times for electronic submissions, an...
Michiharu Kudo
EUROCRYPT
2008
Springer
14 years 12 months ago
Efficient Two Party and Multi Party Computation Against Covert Adversaries
Recently, Aumann and Lindell introduced a new realistic security model for secure computation, namely, security against covert adversaries. The main motivation was to obtain secure...
Vipul Goyal, Payman Mohassel, Adam Smith
PADS
1999
ACM
15 years 2 months ago
Active Virtual Network Management Protocol
This paper introduces a novel algorithm, the Active Virtual Network Management Protocol AVNMP, for predictive network management. It explains how the Active Virtual Network Mana...
Stephen F. Bush