Sciweavers

211 search results - page 17 / 43
» A Message Recognition Protocol Based on Standard Assumptions
Sort
View
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
11 years 10 months ago
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
Abstract. An unresolved problem in research on authenticated key exchange (AKE) is to construct a secure protocol against advanced attacks such as key compromise impersonation and ...
Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Ka...
WEBDB
2010
Springer
224views Database» more  WEBDB 2010»
14 years 27 days ago
Concurrent One-Way Protocols in Around-the-Clock Social Networks
We introduce and study concurrent One-Way Protocols in social networks. The model is motivated by the rise of online social networks and the fast development of automation feature...
Royi Ronen, Oded Shmueli
CISC
2007
Springer
156views Cryptology» more  CISC 2007»
14 years 2 months ago
Deniable Authentication on the Internet
Deniable authentication is a technique that allows one party to send messages to another while the latter can not prove to a third party the fact of communication. In this paper, w...
Shaoquan Jiang
FC
2010
Springer
205views Cryptology» more  FC 2010»
13 years 11 months ago
On Robust Key Agreement Based on Public Key Authentication
—This paper discusses public-key authenticated key agreement protocols. First, we critically analyze several authenticated key agreement protocols and uncover various theoretical...
Feng Hao
CMS
2003
171views Communications» more  CMS 2003»
13 years 9 months ago
Securing the Border Gateway Protocol: A Status Update
The Border Gateway Protocol (BGP) is a critical component of the Internet routing infrastructure, used to distribute routing information between autonomous systems (ASes). It is hi...
Stephen T. Kent