Sciweavers

3751 search results - page 188 / 751
» Events in security protocols
Sort
View
126
Voted
ISW
2005
Springer
15 years 9 months ago
Constant Round Dynamic Group Key Agreement
We present a fully symmetric constant round authenticated group key agreement protocol in dynamic scenario. Our proposed scheme achieves forward secrecy and is provably secure und...
Ratna Dutta, Rana Barua
127
Voted
CRYPTO
2008
Springer
76views Cryptology» more  CRYPTO 2008»
15 years 5 months ago
Scalable Multiparty Computation with Nearly Optimal Work and Resilience
We present the first general protocol for secure multiparty computation in which the total amount of work required by n players to compute a function f grows only polylogarithmical...
Ivan Damgård, Yuval Ishai, Mikkel Krø...
IPL
2006
118views more  IPL 2006»
15 years 4 months ago
Easy intruder deduction problems with homomorphisms
We present complexity results for the verification of security protocols. Since the perfect cryptography assumption is unrealistic for cryptographic primitives with visible algebr...
Stéphanie Delaune
JCP
2006
120views more  JCP 2006»
15 years 4 months ago
Password-authenticated Key Exchange using Efficient MACs
Abstract-- This paper is concerned with passwordauthenticated key agreement protocols. Designing such protocols represents an interesting challenge since there is no standard way o...
Maurizio Adriano Strangio
VR
2002
IEEE
117views Virtual Reality» more  VR 2002»
15 years 9 months ago
An Extensible Event-Based Infrastructure for Networked Virtual Worlds
Many VR platforms emphasize extensibility to support as wide a range of applications as possible. The current trend is to move this extensibility to lower levels of the system to ...
Jim Purbrick, Chris Greenhalgh