Sciweavers

3115 search results - page 232 / 623
» Synthesizing Secure Protocols
Sort
View
IJNSEC
2006
78views more  IJNSEC 2006»
15 years 5 months ago
Authentication and Key Agreement Protocols Preserving Anonymity
Anonymity is a very important security feature in addition to authentication and key agreement features in communication protocols. In this paper, we propose two authentication an...
Kumar V. Mangipudi, Rajendra S. Katti, Huirong Fu
ACSAC
1999
IEEE
15 years 9 months ago
Secure Communications in ATM Networks
The ATM Forum international consortium recently approved the first version of its security specifications aiming to protect communications over Asynchronous Transfer Mode (ATM) ne...
Maryline Laurent, Ahmed Bouabdallah, Christophe De...
EUROCRYPT
2008
Springer
15 years 7 months ago
Towards Key-Dependent Message Security in the Standard Model
Standard security notions for encryption schemes do not guarantee any security if the encrypted messages depend on the secret key. Yet it is exactly the stronger notion of security...
Dennis Hofheinz, Dominique Unruh
144
Voted
GI
2009
Springer
15 years 3 months ago
Towards the impact of the operational environment on the security of e-voting
Abstract: Our paper deals with the security of operational environments for evoting and its importance for the security of electronic elections. So far the security of e-voting was...
Axel Schmidt, Melanie Volkamer, Lucie Langer, Joha...
ALGOSENSORS
2006
Springer
15 years 9 months ago
Efficient Training of Sensor Networks
Abstract. Due to their small form factor and modest energy budget, individual sensors are not expected to be GPS-enabled. Moreover, in most applications, exact geographic location ...
Alan A. Bertossi, Stephan Olariu, Maria Cristina P...