Sciweavers

741 search results - page 38 / 149
» Abstract Machines for Communication Security
Sort
View
SCN
2010
Springer
116views Communications» more  SCN 2010»
13 years 8 months ago
Provably Secure Convertible Undeniable Signatures with Unambiguity
Abstract. This paper shows some efficient and provably-secure convertible undeniable signature schemes (with both selective conversion and all conversion), in the standard model an...
Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata
CSL
1992
Springer
14 years 1 months ago
Communicating Evolving Algebras
We develop the rst steps of a theory of concurrency within the framework of evolving algebras of Gurevich, with the aim of investigating its suitability for the role of a general f...
Paola Glavan, Dean Rosenzweig
MA
2001
Springer
175views Communications» more  MA 2001»
14 years 2 months ago
Evaluating the Security of Three Java-Based Mobile Agent Systems
Abstract. The goal of mobile agent systems is to provide a distributed computing infrastructure supporting applications whose components can move between different execution enviro...
Sebastian Fischmeister, Giovanni Vigna, Richard A....
ISI
2008
Springer
13 years 9 months ago
Secure remote control model for information appliances
Abstract--Recently, Lee et al. proposed a Remote Authentication Model of Information Appliances (RAMIA). Unfortunately, RAMIA has a fatal error that opens the entire home network o...
Wen-Gong Shieh, Jian-Min Wang, Wen-Bing Horng
SECON
2007
IEEE
14 years 4 months ago
BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks
Abstract—In this work we identify vulnerabilities of ondemand multicast routing protocols for multi-hop wireless networks and discuss the challenges encountered in designing mech...
Reza Curtmola, Cristina Nita-Rotaru