Sciweavers

4305 search results - page 159 / 861
» Analysing Protocol Implementations
Sort
View
ISSAC
1999
Springer
136views Mathematics» more  ISSAC 1999»
14 years 1 months ago
Design and Protocol for Internet Accessible Mathematical Computation
Mathematical computing can become easily accessible and conveniently usable on the Internet. The distributed Internet Accessible Mathematical Computation (IAMC) system can supply ...
Paul S. Wang
CTRSA
2010
Springer
191views Cryptology» more  CTRSA 2010»
14 years 13 days ago
Making the Diffie-Hellman Protocol Identity-Based
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [33]) each party uses its own identity as public key and rece...
Dario Fiore, Rosario Gennaro
EUROPKI
2009
Springer
13 years 7 months ago
Automatic Generation of Sigma-Protocols
Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many cryptographic applications such as identification schemes, group signatures, and secure mult...
Endre Bangerter, Thomas Briner, Wilko Henecka, Ste...
VLSID
2006
IEEE
142views VLSI» more  VLSID 2006»
14 years 9 months ago
Impact of Configurability and Extensibility on IPSec Protocol Execution on Embedded Processors
- Security protocols, such as IPSec and SSL, are being increasingly deployed in the context of networked embedded systems. The resource-constrained nature of embedded systems and, ...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
MSS
2003
IEEE
98views Hardware» more  MSS 2003»
14 years 2 months ago
A Performance Analysis of the iSCSI Protocol
Fibre channel has long dominated the realm of storage area networks (SAN’s). However, with increased development and refining, iSCSI is fast becoming an equal contender, which ...
Stephen Aiken, Dirk Grunwald, Andrew R. Pleszkun, ...