Sciweavers

5324 search results - page 207 / 1065
» Internet Security Protocols
Sort
View
JCS
2006
74views more  JCS 2006»
15 years 4 months ago
On the impossibility of building secure Cliques-type authenticated group key agreement protocols
The A-GDH.2 and SA-GDH.2 authenticated group key agreement
Olivier Pereira, Jean-Jacques Quisquater
JISE
2006
37views more  JISE 2006»
15 years 4 months ago
Secure Authentication Protocols Resistant to Guessing Attacks
Jia-Ning Luo, Shiuh-Pyng Shieh, Ji-Chiang Shen
TISSEC
2008
80views more  TISSEC 2008»
15 years 4 months ago
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
Baruch Awerbuch, Reza Curtmola, David Holmer, Cris...
JCS
2007
69views more  JCS 2007»
15 years 4 months ago
Timed analysis of security protocols
Ricardo Corin, Sandro Etalle, Pieter H. Hartel, An...
CI
2004
95views more  CI 2004»
15 years 4 months ago
Automated Design of Security Protocols
Hao Chen, John A. Clark, Jeremy L. Jacob