Sciweavers

212 search results - page 27 / 43
» Further analysis of the Internet key exchange protocol
Sort
View
CRYPTO
2005
Springer
113views Cryptology» more  CRYPTO 2005»
15 years 3 months ago
Secure Communications over Insecure Channels Based on Short Authenticated Strings
Abstract. We propose a way to establish peer-to-peer authenticated communications over an insecure channel by using an extra channel which can authenticate very short strings, e.g....
Serge Vaudenay
JAR
2008
115views more  JAR 2008»
14 years 9 months ago
Formal Models and Analysis of Secure Multicast in Wired and Wireless Networks
The spreading of multicast technology enables the development of group communication and so dealing with digital streams becomes more and more common over the Internet. Given the f...
Roberto Gorrieri, Fabio Martinelli, Marinella Petr...
INFOCOM
2003
IEEE
15 years 2 months ago
Analysis of Routing Characteristics in the Multicast Infrastructure
Abstract— As the multicast-capable part of the Internet continues to evolve, important questions to ask are whether the protocols are operating correctly, the topology is well co...
Prashant Rajvaidya, Kevin C. Almeroth
ECOOPW
1999
Springer
15 years 1 months ago
Piccola - A Small Composition Language
Moore’s Law is pushing us inevitably towards a world of pervasive, wireless, spontaneously networked computing devices. Whatever these devices do, they will have to talk to and n...
Oscar Nierstrasz
NDSS
2007
IEEE
15 years 3 months ago
Secret Handshakes with Dynamic and Fuzzy Matching
The need for communication privacy over public networks is of growing concern in today’s society. As a result, privacy-preserving authentication and key exchange protocols have ...
Giuseppe Ateniese, Jonathan Kirsch, Marina Blanton