Sciweavers

5665 search results - page 359 / 1133
» Introduction to Computer Security
Sort
View
128
Voted
NDSS
1998
IEEE
15 years 6 months ago
The Secure Remote Password Protocol
This paper presents a new password authentication and key-exchange protocol suitable for authenticating users and exchanging keys over an untrusted network. The new protocol resis...
Thomas D. Wu
164
Voted
WIS
2004
15 years 4 months ago
AuthenLink: A User-Centred Authentication System for a Secure Mobile Commerce
We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Num...
Christina Braz, Esma Aïmeur
107
Voted
CORR
2008
Springer
166views Education» more  CORR 2008»
15 years 2 months ago
Information-Theoretically Secure Voting Without an Honest Majority
We present three voting protocols with unconditional privacy and information-theoretic correctness, without assuming any bound on the number of corrupt voters or voting authorities...
Anne Broadbent, Alain Tapp
129
Voted
CN
2007
77views more  CN 2007»
15 years 2 months ago
Secure many-to-one symbol transmission for implementation on smart cards
Multicast communication is arguably the most promising paradigm to enable mass Internet transmission of live events, or any other content sent on the network from a single source ...
Francesc Sebé, Alexandre Viejo, Josep Domin...
PERCOM
2010
ACM
15 years 1 months ago
Security analysis of reliable transport layer protocols for wireless sensor networks
End-to-end reliability of communications is an important requirement in many applications of wireless sensor networks. For this reason, a number of reliable transport protocols sp...
Levente Buttyán, L. Csik