Sciweavers

96 search results - page 8 / 20
» A novel three-party encrypted key exchange protocol
Sort
View
SENSYS
2005
ACM
14 years 1 months ago
A new approach for establishing pairwise keys for securing wireless sensor networks
Wireless sensor networks based on highly resource-constrained devices require symmetric cryptography in order to make them secure. Integral to this is the exchange of unique symme...
Arno Wacker, Mirko Knoll, Timo Heiber, Kurt Rother...
CCS
1994
ACM
13 years 11 months ago
Protocol Failure in the Escrowed Encryption Standard
The Escrowed Encryption Standard (EES) defines a US Government family of cryptographic processors, popularly known as "Clipper" chips, intended to protect unclassified g...
Matt Blaze
ACSAC
2000
IEEE
13 years 12 months ago
A Novel Approach to On-Line Status Authentication of Public-Key Certificates
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, like legally valid documents and business transactions, poses severe security cons...
Eugenio Faldella, Marco Prandini
CCS
2003
ACM
13 years 11 months ago
LEAP: efficient security mechanisms for large-scale distributed sensor networks
We describe LEAP (Localized Encryption and Authentication Protocol), a key management protocol for sensor networks that is designed to support in-network processing, while at the ...
Sencun Zhu, Sanjeev Setia, Sushil Jajodia
FC
2010
Springer
209views Cryptology» more  FC 2010»
13 years 11 months ago
Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy
We introduce the novel notion of Verifiable Encryption of Chameleon Signatures (VECS), and then use it to design a three-round abuse-free optimistic contract signing protocol. Key...
Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Qianhong...