Sciweavers

356 search results - page 38 / 72
» AUTHMAC_DH: A New Protocol for Authentication and Key Distri...
Sort
View
INFOCOM
2005
IEEE
14 years 1 months ago
Anonymous communications in mobile ad hoc networks
— Due to the broadcast nature of radio transmissions, communications in mobile ad hoc networks (MANETs) are more susceptible to malicious traffic analysis. In this paper we prop...
Yanchao Zhang, Wei Liu, Wenjing Lou
EUROCRYPT
2005
Springer
14 years 1 months ago
Universally Composable Password-Based Key Exchange
Abstract. We propose and realize a definition of security for passwordbased key exchange within the framework of universally composable (UC) security, thus providing security guar...
Ran Canetti, Shai Halevi, Jonathan Katz, Yehuda Li...
CSFW
2002
IEEE
14 years 18 days ago
Types and Effects for Asymmetric Cryptographic Protocols
We present the first type and effect system for proving authenticity properties of security protocols based on asymmetric cryptography. The most significant new features of our ...
Andrew D. Gordon, Alan Jeffrey
FSE
2009
Springer
159views Cryptology» more  FSE 2009»
14 years 2 months ago
Intel's New AES Instructions for Enhanced Performance and Security
The Advanced Encryption Standard (AES) is the Federal Information Processing Standard for symmetric encryption. It is widely believed to be secure and efficient, and is therefore b...
Shay Gueron
SAC
2002
ACM
13 years 7 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...