Sciweavers

610 search results - page 67 / 122
» Information-theoretically secure protocols and security unde...
Sort
View
SIGCOMM
2012
ACM
13 years 2 months ago
MultiNet: usable and secure WiFi device association
This demo presents MultiNet, a novel method for joining devices to a domestic Wi-Fi network. MultiNet dynamically reconfigures the network to accept each device, rather than con...
Anthony Brown, Richard Mortier, Tom Rodden
EUROCRYPT
2008
Springer
15 years 1 months ago
Almost-Everywhere Secure Computation
Secure multi-party computation (MPC) is a central problem in cryptography. Unfortunately, it is well known that MPC is possible if and only if the underlying communication network...
Juan A. Garay, Rafail Ostrovsky
WISA
2009
Springer
15 years 6 months ago
Securing Remote Access Inside Wireless Mesh Networks
Wireless mesh networks (WMNs) that are being increasingly deployed in communities and public places provide a relatively stable routing infrastructure and can be used for diverse c...
Mark Manulis
BROADNETS
2007
IEEE
15 years 3 months ago
SAABCOT: Secure application-agnostic bandwidth conservation techniques
Abstract-- High speed modern networks are tasked with moving large amounts of data to diverse groups of interested parties. Often under heavy loads, a significant portion of the da...
Chad D. Mano, David Salyers, Qi Liao, Andrew Blaic...
JNCA
2011
185views more  JNCA 2011»
14 years 6 months ago
Design of a secure distance-bounding channel for RFID
Distance bounding is often proposed as a countermeasure to relay attacks and distance fraud in RFID proximity identification systems. Although several distance-bounding protocols...
Gerhard P. Hancke