Sciweavers

631 search results - page 34 / 127
» Strong Authentication and Strong Integrity (SASI) Is Not Tha...
Sort
View
CIS
2005
Springer
15 years 7 months ago
On the Security of Some Password-Based Key Agreement Schemes
In this paper we show that two potential security vulnerabilities exist in the strong password-only authenticated key exchange scheme due to Jablon. Two standardised schemes based...
Qiang Tang, Chris J. Mitchell
IFIP
2004
Springer
15 years 7 months ago
Pattern-Matching Spi-Calculus
Cryptographic protocols often make use of nested cryptographic primitives, for example signed message digests, or encrypted signed messages. Gordon and Jeffrey’s prior work on ty...
Christian Haack, Alan Jeffrey
ESORICS
2003
Springer
15 years 6 months ago
Hardware Encapsulation of Security Services
Hardware security modules can be used to encapsulate simple security services that bind security functions such as decryption with authorisation and authentication. Such hardware ...
Adrian Baldwin, Simon Shiu
FC
2006
Springer
147views Cryptology» more  FC 2006»
15 years 5 months ago
Timed-Release and Key-Insulated Public Key Encryption
In this paper we consider two security notions related to Identity Based Encryption: Key-insulated public key encryption, introduced by Dodis, Katz, Xu and Yung; and Timed-Release ...
Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan...
WDAG
2000
Springer
125views Algorithms» more  WDAG 2000»
15 years 5 months ago
Establishing Business Rules for Inter-Enterprise Electronic Commerce
Conventional mechanisms for electronic commerce provide strong means for securing transfer of funds, and for ensuring such things as authenticity and non-repudiation. But they gene...
Victoria Ungureanu, Naftaly H. Minsky