Sciweavers

356 search results - page 62 / 72
» AUTHMAC_DH: A New Protocol for Authentication and Key Distri...
Sort
View
CCS
2005
ACM
14 years 1 months ago
Countering DoS attacks with stateless multipath overlays
Indirection-based overlay networks (IONs) are a promising approach for countering distributed denial of service (DDoS) attacks. Such mechanisms are based on the assumption that at...
Angelos Stavrou, Angelos D. Keromytis
FTDCS
2003
IEEE
14 years 25 days ago
Service Provisioning and Management in Virtual Private Active Networks
Service providers have been motivated to develop and offer new services to their customers. The key question is what kind of futuristic and practical services customers need. This...
Fábio Luciano Verdi, Edmundo R. M. Madeira
CCS
2009
ACM
14 years 8 months ago
Hidden credential retrieval from a reusable password
We revisit the venerable question of access credentials management, which concerns the techniques that we, humans with limited memory, must employ to safeguard our various access ...
Xavier Boyen
JACM
2006
146views more  JACM 2006»
13 years 7 months ago
Limits on the ability of quantum states to convey classical messages
We revisit the problem of conveying classical messages by transmitting quantum states, and derive new, optimal bounds on the number of quantum bits required for this task. Much of...
Ashwin Nayak, Julia Salzman
CRYPTO
2004
Springer
162views Cryptology» more  CRYPTO 2004»
14 years 28 days ago
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
We propose the first distributed discrete-log key generation (DLKG) protocol from scratch which is adaptively-secure in the non-erasure model, and at the same time completely avoi...
Masayuki Abe, Serge Fehr