Sciweavers

86 search results - page 2 / 18
» Handshake Protocols for De-Synchronization
Sort
View
CTRSA
2010
Springer
169views Cryptology» more  CTRSA 2010»
15 years 5 months ago
Hash Function Combiners in TLS and SSL
Abstract. The TLS and SSL protocols are widely used to ensure secure communication over an untrusted network. Therein, a client and server first engage in the so-called handshake ...
Marc Fischlin, Anja Lehmann, Daniel Wagner
87
Voted
ACNS
2006
Springer
121views Cryptology» more  ACNS 2006»
15 years 4 months ago
Authentication for Paranoids: Multi-party Secret Handshakes
In a society increasingly concerned with the steady assault on electronic privacy, the need for privacy-preserving techniques is both natural and justified. This need extends to t...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
79
Voted
CTRSA
2001
Springer
108views Cryptology» more  CTRSA 2001»
15 years 2 months ago
Improving SSL Handshake Performance via Batching
We present an algorithmic approach for speeding up SSL’s performance on a web server. Our approach improves the performance of SSL’s handshake protocol by up to a factor of 2....
Hovav Shacham, Dan Boneh
LCN
2006
IEEE
15 years 4 months ago
Ethernet Adaptive Link Rate (ALR): Analysis of a MAC Handshake Protocol
Himanshu Anand, Casey Reardon, Rajagopal Subramani...
72
Voted
MOBICOM
1999
ACM
15 years 2 months ago
Reversing the Collision-Avoidance Handshake in Wireless Networks
Many medium-access control (MAC) protocols for wireless networks proposed or implemented to date are based on collisionavoidance handshakes between sender and receiver. In the vas...
J. J. Garcia-Luna-Aceves, Asimakis Tzamaloukas