Sciweavers

2947 search results - page 23 / 590
» The timely token protocol
Sort
View
FC
2007
Springer
128views Cryptology» more  FC 2007»
15 years 6 months ago
Informant: Detecting Sybils Using Incentives
We propose an economic approach to Sybil attack detection. In our Informant protocol, a detective offers a reward for Sybils to reveal themselves. The detective accepts from one i...
N. Boris Margolin, Brian Neil Levine
IWSOS
2007
Springer
15 years 6 months ago
Automated Trust Negotiation in Autonomic Environments
Autonomic computing environments rely on devices that are able to make intelligent decisions without human supervision. Automated Trust Negotiation supports the cooperation of devi...
Andreas Klenk, Frank Petri, Benoit Radier, Mika&eu...
IJISEC
2010
121views more  IJISEC 2010»
14 years 10 months ago
Flowchart description of security primitives for controlled physical unclonable functions
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable and that behave like a random function when subjected to a challenge. Their use h...
Boris Skoric, Marc X. Makkes
COMPSEC
2008
99views more  COMPSEC 2008»
14 years 12 months ago
SSL/TLS session-aware user authentication revisited
Man-in-the-middle (MITM) attacks pose a serious threat to SSL/TLS-based e-commerce applications, and there are only a few technologies available to mitigate the risks. In [OHB05], ...
Rolf Oppliger, Ralf Hauser, David A. Basin
IWSEC
2010
Springer
14 years 9 months ago
Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption
This paper presents efficient secure auction protocols for first price auction and second price auction. Previous auction protocols are based on a generally secure multi-party prot...
Takuho Mitsunaga, Yoshifumi Manabe, Tatsuaki Okamo...