Sciweavers

3751 search results - page 91 / 751
» Events in security protocols
Sort
View
EUROCRYPT
2003
Springer
15 years 3 months ago
Fair Secure Two-Party Computation
Abstract Benny Pinkas HP Labs Abstract. We demonstrate a transformation of Yao’s protocol for secure two-party computation to a fair protocol in which neither party gains any sub...
Benny Pinkas
JCST
2008
128views more  JCST 2008»
14 years 9 months ago
t-Private and t-Secure Auctions
In most of the used auction systems the values of bids are known to the auctioneer. This allows him to manipulate the outcome of the auction. Hence, one is interested in hiding th...
Markus Hinkelmann, Andreas Jakoby, Peer Stechert
JDCTA
2010
187views more  JDCTA 2010»
14 years 4 months ago
Automatic Verification of Security Properties in Remote Internet Voting Protocol with Applied Pi Calculus
Soundness and coercion resistance are the important and intricate security requirements for remote voting protocols. Several formal models of soundness and coercion-resistance hav...
Bo Meng, Wei Huang, Zimao Li, Dejun Wang
WCNC
2010
IEEE
15 years 1 months ago
Experiences and Lessons from Implementing a Wireless Sensor Network MAC Protocol in the Castalia Simulator
—We describe our experience from the implementation of the T-MAC protocol for wireless sensor networks in the open-source Castalia simulator. Notwithstanding the popularity of th...
Yuri Tselishchev, Athanassios Boulis, Lavy Libman
CTRSA
2010
Springer
169views Cryptology» more  CTRSA 2010»
15 years 4 months ago
Hash Function Combiners in TLS and SSL
Abstract. The TLS and SSL protocols are widely used to ensure secure communication over an untrusted network. Therein, a client and server first engage in the so-called handshake ...
Marc Fischlin, Anja Lehmann, Daniel Wagner