Sciweavers

947 search results - page 80 / 190
» Provable Implementations of Security Protocols
Sort
View
P2P
2008
IEEE
15 years 6 months ago
Proactive Role Discovery in Mediator-Free Environments
The rapid proliferation of Internet and related technologies has created tremendous possibilities for the interoperability between domains in distributed environments. Interoperab...
Mohamed Shehab, Elisa Bertino, Arif Ghafoor
CRYPTO
2010
Springer
181views Cryptology» more  CRYPTO 2010»
15 years 29 days ago
On the Efficiency of Classical and Quantum Oblivious Transfer Reductions
Due to its universality oblivious transfer (OT) is a primitive of great importance in secure multi-party computation. OT is impossible to implement from scratch in an unconditional...
Severin Winkler, Jürg Wullschleger
ESORICS
2007
Springer
15 years 6 months ago
Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control
Abstract. From a security standpoint, it is preferable to implement least privilege network security policies in which only the bare minimum of TCP/UDP ports on internal hosts are ...
Paul Z. Kolano
IJNSEC
2007
121views more  IJNSEC 2007»
14 years 11 months ago
Injecting Heterogeneity Through Protocol Randomization
In this paper, we argue that heterogeneity should be an important principle in design and use of cryptographic protocols. We use automated formal analysis tools to randomly genera...
Li Zhuang, J. D. Tygar, Rachna Dhamija
ICC
2007
IEEE
169views Communications» more  ICC 2007»
15 years 6 months ago
Secure Vehicular Communications Based on Group Signature and ID-Based Signature Scheme
—Vehicular communication networking is a promising approach of facilitating road safety, traffic management, and infotainment dissemination for drivers and passengers. However, i...
Xiaoting Sun, Xiaodong Lin, Pin-Han Ho