Sciweavers

1612 search results - page 118 / 323
» About models of security protocols
Sort
View
EUROPKI
2006
Springer
15 years 7 months ago
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
Abstract. Key agreement protocols are a fundamental building block for ensuring authenticated and private communications between two parties over an insecure network. This paper fo...
Maurizio Adriano Strangio
LCN
1998
IEEE
15 years 8 months ago
Effect of Hidden Terminals on the Performance of IEEE 802.11 MAC Protocol
The hidden terminal problem is unique to wireless networks and as of now, there is very limited understanding about it's effects on network performance. Results are presented...
Sumit Khurana, Anurag Kahol, Anura P. Jayasumana
ISORC
2003
IEEE
15 years 9 months ago
Implementing the Multicast Inter-ORB Protocol
This paper presents our experiments for integrating OMG MIOP (Multicast Inter-ORB Protocol) specifications into a CORBA ORB. We proposed an integration model which allows the coex...
Alysson Neves Bessani, Joni da Silva Fraga, Lau Ch...
NDSS
2008
IEEE
15 years 10 months ago
A New Privacy-Enhanced Matchmaking Protocol
Although several wide-spread internet applications (e.g., job-referral services, dating services) can benefit from online matchmaking, protocols defined over the past two decade...
Ji Sun Shin, Virgil D. Gligor
IJNSEC
2010
100views more  IJNSEC 2010»
14 years 11 months ago
On the Security of Yuan et al.'s Undeniable Signature Scheme
Undeniable signatures were proposed to limit the public verification property of ordinary digital signature. In fact, the verification of such signatures cannot be obtained withou...
Wei Zhao