Sciweavers

894 search results - page 68 / 179
» Secure Implementation of Channel Abstractions
Sort
View
NDSS
2002
IEEE
15 years 7 months ago
Talking to Strangers: Authentication in Ad-Hoc Wireless Networks
In this paper we address the problem of secure communication and authentication in ad-hoc wireless networks. This is a difficult problem, as it involves bootstrapping trust betwe...
Dirk Balfanz, Diana K. Smetters, Paul Stewart, H. ...
138
Voted
JDCTA
2010
175views more  JDCTA 2010»
14 years 9 months ago
Evolution Cipher against Differential Power Attack
: Differntial Power Attack (DPA) is one kind of Side Channel Attacks (SCAs). There are two phases in DPA attacks: sample collection and statistical analysis, which can be utilized ...
Shubo Liu, Ming Tang, Si Gao, Huanguo Zhang
117
Voted
TCC
2004
Springer
118views Cryptology» more  TCC 2004»
15 years 8 months ago
A General Composition Theorem for Secure Reactive Systems
Abstract. We consider compositional properties of reactive systems that are secure in a cryptographic sense. We follow the well-known simulatability approach of modern cryptography...
Michael Backes, Birgit Pfitzmann, Michael Waidner
106
Voted
SEC
2001
15 years 4 months ago
On Securely Scheduling a Meeting
Abstract When people want to schedule a meeting, their agendas must be compared to find a time suitable for all participants. At the same time, people want to keep their agendas pr...
T. Herlea, Joris Claessens, Bart Preneel, Gregory ...
120
Voted
ASIACRYPT
2008
Springer
15 years 4 months ago
MPC vs. SFE : Unconditional and Computational Security
Abstract. In secure computation among a set P of players one considers an adversary who can corrupt certain players. The three usually considered types of corruption are active, pa...
Martin Hirt, Ueli M. Maurer, Vassilis Zikas