Sciweavers

403 search results - page 5 / 81
» Secure Protocols with Asymmetric Trust
Sort
View
IEEEARES
2008
IEEE
15 years 3 months ago
Towards Secure E-Commerce Based on Virtualization and Attestation Techniques
We present a secure e-commerce architecture that is resistant to client compromise and man-in-the-middle attacks on SSL. To this end, we propose several security protocols that us...
Frederic Stumpf, Claudia Eckert, Shane Balfe
108
Voted
TIFS
2011
252views Education» more  TIFS 2011»
14 years 4 months ago
Secure Device Pairing Based on a Visual Channel: Design and Usability Study
— “Pairing” is the establishment of authenticated key agreement between two devices over a wireless channel. Such devices are ad hoc in nature as they lack any common preshar...
Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N...
SPW
2005
Springer
15 years 2 months ago
Multi-channel Protocols
We examine several ad-hoc pairing protocols that strengthen their radio exchanges with additional transmissions over another channel, for example a screen showing graphically encod...
Ford-Long Wong
83
Voted
NSPW
2004
ACM
15 years 2 months ago
A collaborative approach to autonomic security protocols
This paper considers a new security protocol paradigm whereby principals negotiate and on-the-fly generate security protocols according to their needs. When principals wish to in...
Hongbin Zhou, Simon N. Foley
84
Voted
APNOMS
2007
Springer
15 years 3 months ago
On a Low Security Overhead Mechanism for Secure Multi-path Routing Protocol in Wireless Mesh Network
Secure multi-path routing is a critical issue in security management of WMNs due to its multi-hop nature as each node takes part in routing mechanism making it prone to routing att...
Muhammad Shoaib Siddiqui, Syed Obaid Amin, Choong ...