Sciweavers

3115 search results - page 186 / 623
» Synthesizing Secure Protocols
Sort
View
GI
2005
Springer
15 years 9 months ago
Security Extensions to MMARP Through Cryptographically Generated Addresses
: The MMARP protocol provides multicast routing in hybrid environments in which an ad hoc network is connected to the Internet. As many other routing protocols it was initially des...
Francisco J. Galera, Pedro M. Ruiz, Antonio F. G&o...
INFOCOM
1996
IEEE
15 years 8 months ago
Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions
The Transmission Control Protocol Internet Protocol TCP IP 1 suite is a very widely used technique that is employed to interconnect computing facilities in modern network environm...
Biswaroop Guha, Biswanath Mukherjee
ASIAN
2007
Springer
76views Algorithms» more  ASIAN 2007»
15 years 8 months ago
Secure Verification of Location Claims with Simultaneous Distance Modification
We investigate the problem of verifying location claims of mobile devices, and propose a new property called simultaneous distance modification (SDM). In localization protocols sat...
Vitaly Shmatikov, Ming-Hsiu Wang
CTRSA
2009
Springer
179views Cryptology» more  CTRSA 2009»
15 years 10 months ago
Adaptively Secure Two-Party Computation with Erasures
In the setting of multiparty computation a set of parties with private inputs wish to compute some joint function of their inputs, whilst preserving certain security properties (l...
Andrew Y. Lindell
MOBISYS
2011
ACM
14 years 6 months ago
ProxiMate: proximity-based secure pairing using ambient wireless signals
Forming secure associations between wireless devices that do not share a prior trust relationship is an important problem. This paper presents ProxiMate, a system that allows wire...
Suhas Mathur, Robert C. Miller, Alexander Varshavs...