Sciweavers

1190 search results - page 151 / 238
» Secure off-the-record messaging
Sort
View
108
Voted
IEEEMSP
2002
IEEE
177views Multimedia» more  IEEEMSP 2002»
15 years 5 months ago
Data masking: a secure-covert channel paradigm
— It is well known that encryption provides secure channels for communicating entities. However, due to lack of covertness on these channels, an eavesdropper can identify encrypt...
Regunathan Radhakrishnan, Kulesh Shanmugasundaram,...
88
Voted
FC
1999
Springer
160views Cryptology» more  FC 1999»
15 years 5 months ago
Anonymous Authentication of Membership in Dynamic Groups
Abstract. We present a series of protocols for authenticating an individual’s membership in a group without revealing that individual’s identity and without restricting how the...
Stuart E. Schechter, Todd Parnell, Alexander J. Ha...
145
Voted
INFOCOM
1998
IEEE
15 years 5 months ago
Compact and Unforgeable Key Establishment over an ATM Network
Authenticated session key establishment is a central issue in network security. This paper addresses a question on whether we can design a compact, efficient and authenticated key ...
Yuliang Zheng, Hideki Imai
106
Voted
CRYPTO
2008
Springer
132views Cryptology» more  CRYPTO 2008»
15 years 2 months ago
Public-Key Locally-Decodable Codes
In this paper we introduce the notion of a Public-Key Encryption Scheme that is also a Locally-Decodable Error-Correcting Code (PKLDC). In particular, we allow any polynomialtime ...
Brett Hemenway, Rafail Ostrovsky
IJNSEC
2008
160views more  IJNSEC 2008»
15 years 22 days ago
Authenticated Reliable and Semi-reliable Communication in Wireless Sensor Networks
Secure communication in wireless ad hoc sensor networks is a major research concern in the networking community. Especially the few available resources in terms of processing powe...
Falko Dressler