Sciweavers

610 search results - page 78 / 122
» Information-theoretically secure protocols and security unde...
Sort
View
IFIPTCS
2010
14 years 9 months ago
A Semiring-Based Trace Semantics for Processes with Applications to Information Leakage Analysis
Abstract. We propose a framework for reasoning about program security building on language-theoretic and coalgebraic concepts. The behaviour of a system is viewed as a mapping from...
Michele Boreale, David Clark, Daniele Gorla
AINA
2004
IEEE
15 years 3 months ago
Peer-To-Peer Technology for Interconnecting Web Services in Heterogeneous Networks
The interconnection of software components is a key to enabling collaborative work. However, technology differences and security barriers like firewalls often hinder establishing ...
Tim Schattkowsky, Christoph Loeser, Wolfgang M&uum...
SACRYPT
2004
Springer
125views Cryptology» more  SACRYPT 2004»
15 years 5 months ago
Password Based Key Exchange with Mutual Authentication
A reasonably efficient password based key exchange (KE) protocol with provable security without random oracle was recently proposed by Katz, et al. [18] and later by Gennaro and Li...
Shaoquan Jiang, Guang Gong
TCC
2005
Springer
139views Cryptology» more  TCC 2005»
15 years 5 months ago
The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives
Abstract. We consider the problem of password-authenticated key exchange (PAK) also known as session-key generation using passwords: constructing session-key generation protocols t...
Minh-Huyen Nguyen
CRYPTO
2004
Springer
130views Cryptology» more  CRYPTO 2004»
15 years 5 months ago
Signature Schemes and Anonymous Credentials from Bilinear Maps
Abstract. We propose a new and efficient signature scheme that is provably secure in the plain model. The security of our scheme is based on a discrete-logarithm-based assumption p...
Jan Camenisch, Anna Lysyanskaya