Sciweavers

3088 search results - page 519 / 618
» Multichannel Security Protocols
Sort
View
CRYPTO
2003
Springer
109views Cryptology» more  CRYPTO 2003»
15 years 9 months ago
On Deniability in the Common Reference String and Random Oracle Model
We revisit the definitions of zero-knowledge in the Common Reference String (CRS) model and the Random Oracle (RO) model. We argue that even though these definitions syntacticall...
Rafael Pass
DSOM
2003
Springer
15 years 9 months ago
Visual-Based Anomaly Detection for BGP Origin AS Change (OASC) Events
Instead of relying completely on machine intelligence in anomaly event analysis and correlation, in this paper, we take one step back and investigate the possibility of a human-int...
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Dan...
HUC
2009
Springer
15 years 9 months ago
Authenticating ubiquitous services: a study of wireless hotspot access
: © Authenticating Ubiquitous Services: A Study of Wireless Hotspot Access Tim Kindberg, Chris Bevan, Eamonn O'Neill, James Mitchell, Jim Grimmett, Dawn Woodgate HP Laborator...
Tim Kindberg, Chris Bevan, Eamonn O'Neill, James M...
LICS
1999
IEEE
15 years 8 months ago
Proof Techniques for Cryptographic Processes
Contextual equivalences for cryptographic process calculi, like the spi-calculus, can be used to reason about correctness of protocols, but their definition suffers from quantific...
Michele Boreale, Rocco De Nicola, Rosario Pugliese
DIM
2007
ACM
15 years 8 months ago
Receipt management- transaction history based trust establishment
In a history-based trust-management system, users and service providers use information about past transactions to make trust-based decisions concerning current transactions. One ...
Abhilasha Bhargav-Spantzel, Jungha Woo, Elisa Bert...