Sciweavers

947 search results - page 59 / 190
» Provable Implementations of Security Protocols
Sort
View
GI
2005
Springer
15 years 5 months ago
Entity Recognition for Sensor Network Motes
d Abstract) Stefan Lucks1 , Erik Zenner2 , Andr´e Weimerskirch3 , Dirk Westhoff4 1 Theoretische Informatik, University of Mannheim, Germany 2 Erik Zenner, Cryptico A/S, Copenhagen...
Stefan Lucks, Erik Zenner, André Weimerskir...
WPES
2005
ACM
15 years 5 months ago
Secure off-the-record messaging
At the 2004 Workshop on Privacy in the Electronic Society (WPES), Borisov, Goldberg and Brewer, presented “Off the Record Messaging” (OTR), a protocol designed to add endto-e...
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
MOBISEC
2009
Springer
15 years 6 months ago
SAVAH: Source Address Validation with Host Identity Protocol
Explosive growth of the Internet and lack of mechanisms that validate the authenticity of a packet source produced serious security and accounting issues. In this paper, we propose...
Dmitriy Kuptsov, Andrei Gurtov
WISTP
2010
Springer
15 years 6 months ago
Towards Electrical, Integrated Implementations of SIMPL Systems
ct This paper discusses the practical implementation of a novel security tool termed SIMPL system, which was introduced in [1]. SIMPL systems can be regarded as a public key versio...
Ulrich Rührmair, Qingqing Chen, Martin Stutzm...
CCR
2002
113views more  CCR 2002»
14 years 11 months ago
A secure multicast protocol with copyright protection
We present a simple, efficient, and secure multicast protocol with copyright protection in an open and insecure network environment. There is a wide variety of multimedia applicat...
Hao-Hua Chu, Lintian Qiao, Klara Nahrstedt, Hua Wa...