Sciweavers

2472 search results - page 109 / 495
» Parallel Key Exchange
Sort
View
115
Voted
CONEXT
2007
ACM
15 years 6 months ago
Experimenting with real-life opportunistic communications using windows mobile devices
Pocket Switched Networks (PSN) is a novel communication paradigm which aims to exploit the opportunistic contacts between mobile devices to exchange data over multiple hops. A key...
Anna Kaisa Pietiläinen, Christophe Diot
CSFW
1995
IEEE
15 years 6 months ago
Modelling and verifying key-exchange protocols using CSP and FDR
We discuss the issues involved in modelling and verifying key-exchange protocols within the framework of CSP and its model-checking tool FDR. Expressing such protocols within a pr...
A. W. Roscoe
103
Voted
CSREASAM
2006
15 years 4 months ago
Security Analysis of the Digital Transmission Copy Protection Specification
- This paper analyzes the secure protocols in the digital transmission copy protection (DTCP) specification. The full authentication protocol in the specification is a combination ...
Haibo Tian, Yumin Wang
106
Voted
DGO
2003
118views Education» more  DGO 2003»
15 years 4 months ago
Enabling Email Confidentiality through the use of Opportunistic Encryption
Software for encrypting email messages has been widely available for more than 15 years, but the emailusing public has failed to adopt secure messaging. This failure can be explai...
Simson L. Garfinkel
98
Voted
ENTCS
2006
138views more  ENTCS 2006»
15 years 2 months ago
Model Checking Russian Cards
We implement a specific protocol for bit exchange among card-playing agents in three different state-of-the-art epistemic model checkers and compare the results. Key words: Crypto...
Hans P. van Ditmarsch, Wiebe van der Hoek, Ron van...