Sciweavers

116 search results - page 16 / 24
» Anonymous Authentication
Sort
View
CSREASAM
2007
13 years 9 months ago
A PDA Implementation of an Off-line e-Cash Protocol
— We present an efficient implementation of a fair e-cash protocol especially designed for mobile wireless environments. Our protocol attempts to offer a reasonable balance betw...
Efrén Clemente-Cuervo, Francisco Rodr&iacut...
CORR
2010
Springer
152views Education» more  CORR 2010»
13 years 5 months ago
A new key establishment scheme for wireless sensor networks
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the se...
Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu
DBSEC
1998
115views Database» more  DBSEC 1998»
13 years 8 months ago
Secure Mediation: Requirements and Design
In this paper1 we discuss the security requirements for mediation, and present our approach towards satisfying them, with an emphasis on con dentiality and authenticity. Furthermo...
Joachim Biskup, Ulrich Flegel, Yücel Karabulu...
ICPP
2006
IEEE
14 years 1 months ago
hiREP: Hierarchical Reputation Management for Peer-to-Peer Systems
The open feature of peer-to-peer systems invites the spread of the malfunctioning data. Additional reputation systems are constructed to guarantee the data authenticity. One chall...
Xiaomei Liu, Li Xiao
CADE
2010
Springer
13 years 8 months ago
Automating Security Analysis: Symbolic Equivalence of Constraint Systems
We consider security properties of cryptographic protocols, that are either trace properties (such as confidentiality or authenticity) or equivalence properties (such as anonymity ...
Vincent Cheval, Hubert Comon-Lundh, Stéphan...