Sciweavers

677 search results - page 15 / 136
» Secure Pseudonymous Channels
Sort
View
EUROCRYPT
2001
Springer
15 years 2 months ago
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
Abstract. We present a formalism for the analysis of key-exchange protocols that combines previous definitional approaches and results in a definition of security that enjoys som...
Ran Canetti, Hugo Krawczyk
WPES
2003
ACM
15 years 2 months ago
New covert channels in HTTP: adding unwitting Web browsers to anonymity sets
Ì × Ô Ô Ö ÔÖ × ÒØ× Ò Û Ñ Ø Ó × Ò Ð Ò ÒÓÒÝÑÓÙ× Óѹ ÑÙÒ Ø ÓÒ ÓÒ Ø ÁÒØ ÖÒ Øº Ï × Ö Ò Û ÔÖÓØÓ ÓÐ Ø Ø ÐÐÓÛ× Ù× ØÓ ...
Matthias Bauer
CORR
2010
Springer
110views Education» more  CORR 2010»
14 years 9 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya
ASIACRYPT
1999
Springer
15 years 1 months ago
Approximation Hardness and Secure Communication in Broadcast Channels
Problems of secure communication and computation have been studied extensively in network models. Goldreich, Goldwasser, and Linial, Franklin and Yung, and Franklin and Wright have...
Yvo Desmedt, Yongge Wang
ISITA
2010
14 years 4 months ago
On attainment of the capacity of broadband quantum channel by wavelength division multiplexing
Recently, the exact solution of the capacity of an attenuated quantum channel which is a model of a long distance optical fiber channel was derived [V. Giovannetti, et al., Phys. R...
Yoshio Takamura, Shogo Usami, Tsuyoshi Sasaki Usud...