Sciweavers

3115 search results - page 220 / 623
» Synthesizing Secure Protocols
Sort
View
SECURWARE
2008
IEEE
15 years 10 months ago
Formal Modeling of Authentication in SIP Registration
The Session Initiation Protocol (SIP) is increasingly used as a signaling protocol for administrating Voice over IP (VoIP) phone calls. SIP can be configured in several ways so t...
Anders Moen Hagalisletto, Lars Strand
IACR
2011
124views more  IACR 2011»
14 years 3 months ago
Efficient Multicast Key Distribution Using HOWF-based Access Control Structures
— Both broadcast encryption (BE) protocols and multicast key distribution (MKD) protocols try to solve the same problem of private group communication. For the first time, we dis...
Jing Liu, Qiong Huang, Bo Yang
ASIACRYPT
2006
Springer
15 years 7 months ago
HIBE With Short Public Parameters Without Random Oracle
Abstract. At Eurocrypt 2005, Waters presented an identity based encryption (IBE) protocol which is secure in the full model without random oracle. In this paper, we extend Waters&#...
Sanjit Chatterjee, Palash Sarkar
ASIACRYPT
2008
Springer
15 years 6 months ago
Towards Robust Computation on Encrypted Data
Encryption schemes that support computation on encrypted data are useful in constructing efficient and intuitively simple cryptographic protocols. However, the approach was previo...
Manoj Prabhakaran, Mike Rosulek
CDC
2008
IEEE
140views Control Systems» more  CDC 2008»
15 years 10 months ago
Reachability calculations for automated aerial refueling
— This paper describes reachability calculations for a hybrid system formalism governing UAVs interacting with another vehicle in a safety-critical situation. We examine this pro...
Jerry Ding, Jonathan Sprinkle, Shankar S. Sastry, ...