Sciweavers

719 search results - page 67 / 144
» Proving Security Protocols Correct
Sort
View
ICCSA
2007
Springer
15 years 4 months ago
An Enhanced One-Round Pairing-Based Tripartite Authenticated Key Agreement Protocol
A tripartite authenticated key agreement protocol is generally designed to accommodate the need of three specific entities in communicating over an open network with a shared secre...
Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae L...

Publication
545views
15 years 6 months ago
Reid et al.'s Distance Bounding Protocol and Mafia Fraud Attacks over Noisy Channels
Distance bounding protocols are an effective countermeasure against relay attacks including distance fraud, mafia fraud and terrorist fraud attacks. Reid et al. proposed the first ...
A. Mitrokotsa, C. Dimitrakakis, P. Peris-Lopez, J....
CCS
2009
ACM
15 years 10 months ago
Quantifying maximal loss of anonymity in protocols
There is a natural intuitive match between anonymity and information theory. In particular, the maximal anonymity loss in anonymity protocols can be matched to the information the...
Han Chen, Pasquale Malacaria
ISCC
2006
IEEE
126views Communications» more  ISCC 2006»
15 years 3 months ago
A Novel QoS Framework for Medium-Sized MANETs Supporting Multipath Routing Protocols
Multipath routing protocols have proved to be able to enhance the performance of MANET in terms of reliability, load balancing, multimedia streaming, security, etc. However, deplo...
Carlos Miguel Tavares Calafate, Pietro Manzoni, Ma...
CRYPTO
2007
Springer
105views Cryptology» more  CRYPTO 2007»
15 years 4 months ago
A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness
In this paper we identify the (P, Q)-DDH assumption, as an extreme, powerful generalization of the Decisional Diffie-Hellman (DDH) assumption: virtually all previously proposed gen...
Emmanuel Bresson, Yassine Lakhnech, Laurent Mazar&...