Sciweavers

3504 search results - page 161 / 701
» Secure protocol composition
Sort
View
145
Voted
IFIP
2010
Springer
14 years 12 months ago
Security Analysis of the MPLS Label Distribution Protocol
Daniel Guernsey, Aaron Engel, Jonathan Butts, Suje...
JNCA
2010
85views more  JNCA 2010»
14 years 12 months ago
Adaptive security protocol selection for mobile computing
Bruno P. S. Rocha, Daniel N. O. Costa, Rande A. Mo...
ICASSP
2011
IEEE
14 years 8 months ago
Efficient protocols for secure adaptive filtering
Juan Ramón Troncoso-Pastoriza, Fernando P&e...
ASIACRYPT
2003
Springer
15 years 10 months ago
Accumulating Composites and Improved Group Signing
Constructing practical and provably secure group signature schemes has been a very active research topic in recent years. A group signature can be viewed as a digital signature wit...
Gene Tsudik, Shouhuai Xu
138
Voted
WPES
2005
ACM
15 years 10 months ago
Secure off-the-record messaging
At the 2004 Workshop on Privacy in the Electronic Society (WPES), Borisov, Goldberg and Brewer, presented “Off the Record Messaging” (OTR), a protocol designed to add endto-e...
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk