Sciweavers

3504 search results - page 100 / 701
» Secure protocol composition
Sort
View
ACISP
2007
Springer
15 years 6 months ago
Efficient and Secure Comparison for On-Line Auctions
In this note, we describe a correction to the cryptosystem proposed in [1, 2]. Although the correction is small and does not affect the performance of the protocols from [1, 2], it...
Ivan Damgård, Martin Geisler, Mikkel Kr&osla...
139
Voted
GRC
2008
IEEE
15 years 3 months ago
Scalar-product based Secure Two-party Computation
—Secure multiparty computation is a very important research topic in cryptography. A secure multi-party computation involves N untrusful parties. It takes input xi from the ith p...
Chih-Hao Shen, Justin Zhan, Tsan-sheng Hsu, Churn-...
134
Voted
JNW
2006
186views more  JNW 2006»
15 years 2 months ago
Developing Network Domain Security (NDS) Model for IP Multimedia Subsystem (IMS)
In this research article we discuss the protocols, architecture and propose the design of Network Domain Security (NDS) model for IP Multimedia Subsystem (IMS). The IMS is standard...
Muhammad Sher, Thomas Magedanz
152
Voted
SIGMETRICS
2006
ACM
104views Hardware» more  SIGMETRICS 2006»
15 years 8 months ago
Modeling adoptability of secure BGP protocols
Despite the existence of several secure BGP routing protocols, there has been little progress to date on actual adoption. Although feasibility for widespread adoption remains the ...
Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zh...
122
Voted
ICDCS
2007
IEEE
15 years 9 months ago
Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach
Security and reliability of network protocol implementations are essential for communication services. Most of the approaches for verifying security and reliability, such as forma...
Guoqiang Shu, David Lee