Sciweavers

677 search results - page 39 / 136
» Secure Pseudonymous Channels
Sort
View
ACSAC
2002
IEEE
15 years 2 months ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer
TWC
2008
109views more  TWC 2008»
14 years 9 months ago
Using the physical layer for wireless authentication in time-variant channels
Abstract--The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to expl...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
CORR
2010
Springer
66views Education» more  CORR 2010»
14 years 9 months ago
Solutions to the GSM Security Weaknesses
Recently, the mobile industry has experienced an extreme increment in number of its users. The GSM network with the greatest worldwide number of users succumbs to several security...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
SPW
1997
Springer
15 years 1 months ago
Protocols Using Anonymous Connections: Mobile Applications
This paper describes security protocols that use anonymous channels as primitive, much in the way that key distribution protocols ryption as primitive. This abstraction allows us t...
Michael G. Reed, Paul F. Syverson, David M. Goldsc...
CRYPTO
2005
Springer
107views Cryptology» more  CRYPTO 2005»
15 years 3 months ago
A Quantum Cipher with Near Optimal Key-Recycling
Abstract. Assuming an insecure quantum channel and an authenticated classical channel, we propose an unconditionally secure scheme for encrypting classical messages under a shared ...
Ivan Damgård, Thomas Brochmann Pedersen 0002...