Sciweavers

1777 search results - page 164 / 356
» Programming Cryptographic Protocols
Sort
View
ENC
2005
IEEE
15 years 7 months ago
SELES: An e-Voting System for Medium Scale Online Elections
— Recent advances in communication networks and cryptographic techniques have made possible to consider online voting systems as a feasible alternative to conventional elections....
Claudia García-Zamora, Francisco Rodr&iacut...
INFOCOM
2005
IEEE
15 years 7 months ago
Anonymous communications in mobile ad hoc networks
— Due to the broadcast nature of radio transmissions, communications in mobile ad hoc networks (MANETs) are more susceptible to malicious traffic analysis. In this paper we prop...
Yanchao Zhang, Wei Liu, Wenjing Lou
95
Voted
CISC
2005
Springer
116views Cryptology» more  CISC 2005»
15 years 6 months ago
Specifying Authentication Using Signal Events in CSP
The formal analysis of cryptographic protocols has developed into a comprehensive body of knowledge, building on a wide variety of formalisms and treating a diverse range of securi...
Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider
DSN
2002
IEEE
15 years 6 months ago
Secure Intrusion-tolerant Replication on the Internet
This paper describes a Secure INtrusion-Tolerant Replication Architecture1 (SINTRA) for coordination in asynchronous networks subject to Byzantine faults. SINTRA supplies a number...
Christian Cachin, Jonathan A. Poritz
CTRSA
2001
Springer
122views Cryptology» more  CTRSA 2001»
15 years 5 months ago
Password Authentication Using Multiple Servers
Safe long-term storage of user private keys is a problem in client/server systems. The problem can be addressed with a roaming system that retrieves keys on demand from remote cred...
David P. Jablon