Sciweavers

250 search results - page 9 / 50
» A Round and Communication Efficient Secure Ranking Protocol
Sort
View
ASIACRYPT
2010
Springer
13 years 5 months ago
The Round Complexity of Verifiable Secret Sharing: The Statistical Case
We consider the round complexity of a basic cryptographic task: verifiable secret sharing (VSS). This well-studied primitive provides a good "test case" for our understan...
Ranjit Kumaresan, Arpita Patra, C. Pandu Rangan
GLOBECOM
2007
IEEE
14 years 2 months ago
An Efficient Secure Route Discovery Protocol for DSR
Kulasekaran A. Sivakumar, Mahalingam Ramkumar
ICITA
2005
IEEE
14 years 1 months ago
Uncovering Attacks on Security Protocols
Security protocols are indispensable in secure communication. We give an operational semantics of security protocols in terms of a Prolog-like language. With this semantics, we ca...
Wuu Yang
INFOCOM
2012
IEEE
12 years 6 months ago
Expected loss bounds for authentication in constrained channels
We derive bounds on the expected loss for authentication protocols in channels which are constrained due to noisy conditions and communication costs. This is motivated by a numbe...
Christos Dimitrakakis, Aikaterini Mitrokotsa, Serg...
VTC
2010
IEEE
167views Communications» more  VTC 2010»
13 years 6 months ago
An Efficient Authentication Scheme for Security and Privacy Preservation in V2I Communications
—In this paper, we propose a mutual authentication and key agreement scheme for V2I communications. Our scheme improves security and privacy protection compared with the existing...
Jung-Yoon Kim, Hyoung-Kee Choi, John A. Copeland