Sciweavers

460 search results - page 27 / 92
» Heuristic Methods for Security Protocols
Sort
View
MMMACNS
2001
Springer
15 years 2 months ago
Generalized Oblivious Transfer Protocols Based on Noisy Channels
The main cryptographic primitives (Bit Commitment (BC) and Oblivious Transfer (OT) protocols) based on noisy channels have been considered in [1] for asymptotic case. Non-asymptoti...
Valeri Korjik, Kirill Morozov
CORR
2010
Springer
144views Education» more  CORR 2010»
14 years 10 months ago
Privacy-Preserving Protocols for Eigenvector Computation
Abstract. In this paper, we present a protocol for computing the principal eigenvector of a collection of data matrices belonging to multiple semi-honest parties with privacy const...
Manas A. Pathak, Bhiksha Raj
NDSS
1998
IEEE
15 years 2 months ago
Some Timestamping Protocol Failures
Protocol failures are presented for two timestamping schemes. These failures emphasize the importance and di culty of implementing a secure protocol even though there exist secure...
Mike Just
86
Voted
CCS
2006
ACM
15 years 1 months ago
Replayer: automatic protocol replay by binary analysis
We address the problem of replaying an application dialog between two hosts. The ability to accurately replay application dialogs is useful in many security-oriented applications,...
James Newsome, David Brumley, Jason Franklin, Dawn...
ICNSC
2007
IEEE
15 years 4 months ago
A New Anti-Spam Protocol Using CAPTCHA
— Today sending spams has turned to be a major problem in the Internet. It is so serious that more than 80% of the transferred emails are spams. As a result, various methods have...
Sajad Shirali-Shahreza, Ali Movaghar