Sciweavers

948 search results - page 139 / 190
» Attacking cryptographic schemes based on
Sort
View
ATAL
2003
Springer
14 years 1 months ago
An incentive compatible reputation mechanism
Traditional centralised approaches to security are difficult to apply to large, distributed marketplaces in which software agents operate. Developing a notion of trust that is ba...
Radu Jurca, Boi Faltings
MAS
1998
Springer
152views Communications» more  MAS 1998»
14 years 6 days ago
D'Agents: Security in a Multiple-Language, Mobile-Agent System
Abstract. Mobile-agent systems must address three security issues: protecting an individual machine, protecting a group of machines, and protecting an agent. In this chapter, we di...
Robert S. Gray, David Kotz, George Cybenko, Daniel...
CTRSA
2006
Springer
156views Cryptology» more  CTRSA 2006»
13 years 11 months ago
Universally Composable Oblivious Transfer in the Multi-party Setting
We construct efficient universally composable oblivious transfer protocols in the multi-party setting for honest majorities. Unlike previous proposals our protocols are designed in...
Marc Fischlin
CRYPTOLOGIA
2006
155views more  CRYPTOLOGIA 2006»
13 years 8 months ago
The Whirlpool Secure Hash Function
In this paper, we describe Whirlpool, which is a block-cipher-based secure hash function. Whirlpool produces a hash code of 512 bits for an input message of maximum length less tha...
William Stallings
CCS
2010
ACM
14 years 2 months ago
Region-based BGP announcement filtering for improved BGP security
BGP prefix hijacking is a serious security threat on the Internet. In this paper we propose a region-based BGP announcement filtering scheme (RBF) to improve the BGP security. I...
Fernando Sanchez, Zhenhai Duan