Sciweavers

3751 search results - page 519 / 751
» Events in security protocols
Sort
View
133
Voted
EUROPKI
2004
Springer
15 years 10 months ago
Using EMV Cards for Single Sign-On
Abstract. At present, network users have to manage a set of authentication credentials (usually a username/password pair) for every service with which they are registered. Single S...
Andreas Pashalidis, Chris J. Mitchell
156
Voted
MMMACNS
2001
Springer
15 years 9 months ago
Typed MSR: Syntax and Examples
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
Iliano Cervesato
129
Voted
ASIACRYPT
2000
Springer
15 years 9 months ago
Zero-Knowledge and Code Obfuscation
In this paper, we investigate the gap between auxiliary-input zero-knowledge (AIZK) and blackbox-simulation zero-knowledge (BSZK). It is an interesting open problem whether or not ...
Satoshi Hada
CRYPTO
2000
Springer
141views Cryptology» more  CRYPTO 2000»
15 years 9 months ago
Improved Non-committing Encryption Schemes Based on a General Complexity Assumption
Abstract. Non-committing encryption enables the construction of multiparty computation protocols secure against an adaptive adversary in the computational setting where private cha...
Ivan Damgård, Jesper Buus Nielsen
ACSAC
2007
IEEE
15 years 9 months ago
Efficient Distributed Detection of Node Replication Attacks in Sensor Networks
Wireless sensor nodes lack hardware support for tamperresistance and are often deployed in unattended environments, thus leaving them vulnerable to capture and compromise by an ad...
Bo Zhu, Venkata Gopala Krishna Addada, Sanjeev Set...