Sciweavers

1190 search results - page 132 / 238
» Secure off-the-record messaging
Sort
View
168
Voted
IFIPTM
2010
204views Management» more  IFIPTM 2010»
14 years 11 months ago
xESB: An Enterprise Service Bus for Access and Usage Control Policy Enforcement
Enforcing complex policies that span organizational domains is an open challenge. Current work on SOA policy enforcement splits security in logical components that can be distribut...
Gabriela Gheorghe, Stephan Neuhaus, Bruno Crispo
90
Voted
ACSAC
2008
IEEE
15 years 7 months ago
A Survey to Guide Group Key Protocol Development
A large number of papers have proposed cryptographic protocols for establishing secure group communication. These protocols allow group members to exchange or establish keys to en...
Ahren Studer, Christina Johns, Jaanus Kase, Kyle O...
89
Voted
ACISP
2008
Springer
15 years 7 months ago
Collisions for Round-Reduced LAKE
LAKE is a family of cryptographic hash functions presented at FSE 2008. It is an iterated hash function and defines two main instances with a 256 bit and 512 bit hash value. In th...
Florian Mendel, Martin Schläffer
89
Voted
CSFW
2007
IEEE
15 years 7 months ago
The Insecurity Problem: Tackling Unbounded Data
In this paper we focus on tackling the insecurity problem of security protocols in the presence of an unbounded number of data such as nonces or session keys. First, we pinpoint f...
Sibylle B. Fröschle
112
Voted
ADHOCNOW
2006
Springer
15 years 6 months ago
Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks
Recently, identity-based cryptographic (IBC) schemes have been considered to secure mobile ad hoc networks (MANETs) due to their efficient key management properties. However, propo...
Katrin Hoeper, Guang Gong