Sciweavers

5484 search results - page 81 / 1097
» Almost-Everywhere Secure Computation
Sort
View
134
Voted
IACR
2011
207views more  IACR 2011»
14 years 3 months ago
Cryptanalysis and Security Enhancement of an Advanced Authentication Scheme using Smart Cards, and a Key Agreement Scheme for Tw
Abstract—In this work we consider two protocols for performing cryptanalysis and security enhancement. The first one by Song, is a password authentication scheme based on smart ...
Swapnoneel Roy, Amlan K. Das, Yu Li
194
Voted
ICDCS
2012
IEEE
13 years 6 months ago
Securing Virtual Coordinates by Enforcing Physical Laws
—Virtual coordinate systems (VCS) provide accurate estimations of latency between arbitrary hosts on a network, while conducting a small amount of actual measurements and relying...
Jeffrey Seibert, Sheila Becker, Cristina Nita-Rota...
156
Voted
IACR
2011
147views more  IACR 2011»
14 years 3 months ago
Adaptive Security of Concurrent Non-Malleable Zero-Knowledge
A zero-knowledge protocol allows a prover to convince a verifier of the correctness of a statement without disclosing any other information to the verifier. It is a basic tool a...
Zhenfu Cao, Zongyang Zhang, Yunlei Zhao
67
Voted
COMPUTER
2006
64views more  COMPUTER 2006»
15 years 3 months ago
How Secure is RFID?
Sixto Ortiz Jr.
73
Voted
COMPUTER
2006
48views more  COMPUTER 2006»
15 years 3 months ago
Fault Evaluation for Security-Critical Communications Devices
Andrew Rae, Colin J. Fidge, Luke Wildman