Sciweavers

3115 search results - page 238 / 623
» Synthesizing Secure Protocols
Sort
View
WECWIS
2003
IEEE
85views ECommerce» more  WECWIS 2003»
15 years 10 months ago
Intermediary Non-repudiation Protocols
In commercial transactions, an intermediary might be involved to help transacting parties to conduct their business. Nevertheless, the intermediary may not be fully trusted. In th...
Jose Antonio Onieva, Jianying Zhou, Mildrey Carbon...
ATVA
2008
Springer
115views Hardware» more  ATVA 2008»
15 years 7 months ago
Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol
Authentication and secrecy have been widely investigated in security protocols. They are closely related to each other and variants of definitions have been proposed, which focus o...
Guoqiang Li, Mizuhito Ogawa
IJNSEC
2006
113views more  IJNSEC 2006»
15 years 5 months ago
Cryptanalysis of Park's Authentication Protocol in Wireless Mobile Communication Systems
In 2004, C. Park proposed an authentication protocol to provide user anonymity and untraceability in wireless mobile communication systems. The real user identities are hidden and...
Alberto Peinado Domínguez
ACSAC
2003
IEEE
15 years 10 months ago
An Editor for Adaptive XML-Based Policy Management of IPsec
The IPsec protocol provides a mechanism to enforce a range of security services for both confidentiality and integrity, enabling secure transmission of information across networks...
Raj Mohan, Timothy E. Levin, Cynthia E. Irvine
CORR
2010
Springer
99views Education» more  CORR 2010»
15 years 5 months ago
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks
In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols. Considering the Ad ho...
Sugata Sanyal, Dhaval Gada, Rajat Gogri, Punit Rat...