Sciweavers

3938 search results - page 94 / 788
» Interactive Protocols on the Reals
Sort
View
IJSN
2007
94views more  IJSN 2007»
15 years 18 days ago
On security proof of McCullagh?Barreto's key agreement protocol and its variants
: McCullagh and Barreto presented an identity-based authenticated key agreement protocol in CT-RSA 2005. Their protocol was found to be vulnerable to a key-compromise impersonation...
Zhaohui Cheng, Liqun Chen
84
Voted
MFCS
2010
Springer
14 years 11 months ago
Meta-Envy-Free Cake-Cutting Protocols
This paper discusses cake-cutting protocols when the cake is a heterogeneous good that is represented by an interval in the real line. We propose a new desirable property, the meta...
Yoshifumi Manabe, Tatsuaki Okamoto
195
Voted
ECOOP
2009
Springer
16 years 1 months ago
Practical API Protocol Checking with Access Permissions
Reusable APIs often dene usage protocols. We previously developed a sound modular type system that checks compliance with typestate-based protocols while aording a great deal of al...
Kevin Bierhoff, Nels E. Beckman, Jonathan Aldrich
113
Voted
FSTTCS
2003
Springer
15 years 6 months ago
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
We prove the Needham-Schroeder-Lowe public-key protocol secure under real, active cryptographic attacks including concurrent protocol runs. This proof is based on an abstract crypt...
Michael Backes, Birgit Pfitzmann
118
Voted
CORR
2010
Springer
159views Education» more  CORR 2010»
15 years 24 days ago
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags
Radio Frequency Identification (RFID) technology one of the most promising technologies in the field of ubiquitous computing. Indeed, RFID technology may well replace barcode tech...
Eslam Gamal Ahmed, Eman Shaaban, Mohamed Hashem