Sciweavers

3088 search results - page 220 / 618
» Multichannel Security Protocols
Sort
View
150
Voted
IPCCC
2005
IEEE
15 years 10 months ago
A key distribution scheme for double authentication in link state routing protocol
The Double Authentication (DA) scheme presented in [1] is designed to provide security against impersonation attack to link state routing protocol at a lower computational cost as...
D. Huang, A. Sinha, D. Medhi
CHARME
2003
Springer
129views Hardware» more  CHARME 2003»
15 years 9 months ago
On the Correctness of an Intrusion-Tolerant Group Communication Protocol
Intrusion-tolerance is the technique of using fault-tolerance to achieve security properties. Assuming that faults, both benign and Byzantine, are unavoidable, the main goal of Int...
Mohamed Layouni, Jozef Hooman, Sofiène Taha...
116
Voted
CSFW
2000
IEEE
15 years 9 months ago
C3PO: A Tool for Automatic Sound Cryptographic Protocol Analysis
In this paper we present an improved logic for analysing authentication properties of cryptographic protocols, based on the SVO logic of Syverson and van Oorschot. Such logics are...
Anthony H. Dekker
149
Voted
AINA
2006
IEEE
15 years 8 months ago
Efficient Authentication for Reactive Routing Protocols
Ad hoc networks are dynamic networks formed "on the fly" by a set of nodes. Achieving secure routing in such networks is a big challenge. Asymmetric signature schemes pr...
Raghav Bhaskar, Javier Herranz, Fabien Laguillaumi...
CCS
2006
ACM
15 years 8 months ago
Certified mailing lists
Email List Services (or simply, mailing lists) are becoming increasingly common for collaborative computing. In order to enable their use for official purposes with increased effe...
Himanshu Khurana, Hyung-Seok Hahm