Sciweavers

4111 search results - page 257 / 823
» Security, Protocols, and Trust
Sort
View
80
Voted
CAMAD
2006
IEEE
15 years 4 months ago
Three-tier satellite multicast security protocol based on ECMQV and IMC methods
Attila Altay Yavuz, Fatih Alagöz, Emin Anarim
CIS
2006
Springer
15 years 4 months ago
Security and Privacy on Authentication Protocol for Low-Cost RFID
Yong-Zhen Li, Young-Bok Cho, Nam-Kyoung Um, Sang H...
92
Voted
CTRSA
2006
Springer
107views Cryptology» more  CTRSA 2006»
15 years 4 months ago
A Round and Communication Efficient Secure Ranking Protocol
In this work, we initiate the study of realizing a ranking functionality (m1,
Shaoquan Jiang, Guang Gong
74
Voted
EUROCRYPT
2006
Springer
15 years 4 months ago
Parallel and Concurrent Security of the HB and HB+ Protocols
Jonathan Katz, Ji Sun Shin
67
Voted
CRYPTO
1995
Springer
89views Cryptology» more  CRYPTO 1995»
15 years 4 months ago
Secure Signature Schemes based on Interactive Protocols
Ronald Cramer, Ivan Damgård