Sciweavers

620 search results - page 58 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
CSREASAM
2006
14 years 11 months ago
Security Analysis of the Digital Transmission Copy Protection Specification
- This paper analyzes the secure protocols in the digital transmission copy protection (DTCP) specification. The full authentication protocol in the specification is a combination ...
Haibo Tian, Yumin Wang
DGO
2003
118views Education» more  DGO 2003»
14 years 11 months ago
Enabling Email Confidentiality through the use of Opportunistic Encryption
Software for encrypting email messages has been widely available for more than 15 years, but the emailusing public has failed to adopt secure messaging. This failure can be explai...
Simson L. Garfinkel
ENTCS
2006
138views more  ENTCS 2006»
14 years 9 months ago
Model Checking Russian Cards
We implement a specific protocol for bit exchange among card-playing agents in three different state-of-the-art epistemic model checkers and compare the results. Key words: Crypto...
Hans P. van Ditmarsch, Wiebe van der Hoek, Ron van...
ICICS
2010
Springer
14 years 7 months ago
Efficient Authentication for Mobile and Pervasive Computing
With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of su...
Basel Alomair, Radha Poovendran
COMPSYSTECH
2009
14 years 7 months ago
Keeping artifacts alive: towards a knowledge management system
: The paper investigates first the role of artifacts in a cooperative work environment. It shows the different types of artifacts used in work groups. Then, it stresses the charact...
Hilda Tellioglu