Sciweavers

1116 search results - page 87 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
115
Voted
WPES
2004
ACM
15 years 6 months ago
Off-the-record communication, or, why not to use PGP
Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems such as PGP are used, which use long-lived encryptio...
Nikita Borisov, Ian Goldberg, Eric A. Brewer
130
Voted
APN
2008
Springer
15 years 2 months ago
Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets
Abstract. In this paper, we introduce a framework composed of a syntax and its compositional Petri net semantics, for the specification and verification of properties (like authent...
Roland Bouroulet, Raymond R. Devillers, Hanna Klau...
92
Voted
FC
2004
Springer
94views Cryptology» more  FC 2004»
15 years 6 months ago
The Ephemeral Pairing Problem
Abstract In wireless ad-hoc broadcast networks the pairing problem consists of establishing a (long-term) connection between two specific physical nodes in the network that do not...
Jaap-Henk Hoepman
TC
2008
15 years 16 days ago
Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices
In an attempt to expand Public Key Infrastructure (PKI) usage to a ubiquitous and mobile computing environment, we found that the deployment of the PKI on a resource-constrained de...
Ki-Woong Park, Sang Seok Lim, Kyu Ho Park
ISCAS
2002
IEEE
104views Hardware» more  ISCAS 2002»
15 years 5 months ago
High-speed add-compare-select units using locally self-resetting CMOS
This paper presents a new self-resetting CMOS design for an Add-Compare-Select (ACS) unit, which is a key building block in a Viterbi decoder. Static CMOS and two-phase domino CMO...
Gunok Jung, Jun Jin Kong, Gerald E. Sobelman, Kesh...