Sciweavers

1161 search results - page 62 / 233
» Group Message Authentication
Sort
View
85
Voted
CCS
2007
ACM
15 years 6 months ago
A calculus of challenges and responses
er presents a novel approach for concisely abstracting authentication s and for subsequently analyzing those abstractions in a sound manner, i.e., deriving authentication guarante...
Michael Backes, Agostino Cortesi, Riccardo Focardi...
124
Voted
TWC
2008
122views more  TWC 2008»
15 years 17 days ago
TSVC: timed efficient and secure vehicular communications with privacy preserving
In this paper, we propose a Timed Efficient and Secure Vehicular Communication (TSVC) scheme with privacy preservation, which aims at minimizing the packet overhead in terms of sig...
Xiaodong Lin, Xiaoting Sun, Xiaoyu Wang, Chenxi Zh...
144
Voted
IJNSEC
2008
140views more  IJNSEC 2008»
15 years 21 days ago
A Secure Group Key Management Scheme for Wireless Cellular Systems
In wireless networks, secure multicast protocols are more difficult to implement efficiently due to the dynamic nature of the multicast group and the scarcity of bandwidth at the ...
Hwa Young Um, Edward J. Delp
121
Voted
TCS
2002
15 years 10 days ago
Authentication tests and the structure of bundles
Suppose a principal in a cryptographic protocol creates and transmits a message containing a new value v, later receiving v back in a different cryptographic context. It can concl...
Joshua D. Guttman, F. Javier Thayer
SIGCSE
2008
ACM
131views Education» more  SIGCSE 2008»
15 years 18 days ago
Compiler error messages: what can help novices?
Novices find it difficult to understand and use compiler error messages. It is useful to refine this observation and study the effect of different message styles on how well and q...
Marie-Hélène Nienaltowski, Michela P...