Sciweavers

631 search results - page 17 / 127
» Intrusion-Resilient Secure Channels
Sort
View
WPES
2003
ACM
15 years 7 months ago
New covert channels in HTTP: adding unwitting Web browsers to anonymity sets
Ì × Ô Ô Ö ÔÖ × ÒØ× Ò Û Ñ Ø Ó × Ò Ð Ò ÒÓÒÝÑÓÙ× Óѹ ÑÙÒ Ø ÓÒ ÓÒ Ø ÁÒØ ÖÒ Øº Ï × Ö Ò Û ÔÖÓØÓ ÓÐ Ø Ø ÐÐÓÛ× Ù× ØÓ ...
Matthias Bauer
131
Voted
CORR
2010
Springer
110views Education» more  CORR 2010»
15 years 2 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya
ASIACRYPT
1999
Springer
15 years 6 months ago
Approximation Hardness and Secure Communication in Broadcast Channels
Problems of secure communication and computation have been studied extensively in network models. Goldreich, Goldwasser, and Linial, Franklin and Yung, and Franklin and Wright have...
Yvo Desmedt, Yongge Wang
GLOBECOM
2010
IEEE
14 years 12 months ago
Authenticating MIMO Transmissions Using Channel-Like Fingerprinting
Abstract-- A framework for introducing an extrinsic fingerprint signal to space-time coded transmissions at the physical-layer is presented, whereby the fingerprint signal conveys ...
Nate Goergen, W. Sabrina Lin, K. J. Ray Liu, T. Ch...