Sciweavers

3751 search results - page 160 / 751
» Events in security protocols
Sort
View
CCS
2010
ACM
15 years 4 months ago
TASTY: tool for automating secure two-party computations
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private inputs while revealing no information beyond the ou...
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadegh...
JCM
2007
61views more  JCM 2007»
15 years 3 months ago
Supporting Mobility Events within a Hierarchical Mobile IP-over-MPLS Network
Abstract— This paper examines mobility events, and particularly handovers in an overlay environment, where Hierarchical Mobile IP is operating over MPLS. The overlay operation is...
Vasos Vassiliou, Andreas Pitsillides
SPW
2005
Springer
15 years 9 months ago
Repairing the Bluetooth Pairing Protocol
Abstract. We implement and demonstrate a passive attack on the Bluetooth authentication protocol used to connect two devices to each other. Using a protocol analyzer and a brute-fo...
Frank Stajano
SPW
2005
Springer
15 years 9 months ago
Multi-channel Protocols
We examine several ad-hoc pairing protocols that strengthen their radio exchanges with additional transmissions over another channel, for example a screen showing graphically encod...
Ford-Long Wong
IWCMC
2006
ACM
15 years 9 months ago
System approach to intrusion detection using hidden Markov model
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
Rahul Khanna, Huaping Liu