Sciweavers

362 search results - page 42 / 73
» Authenticated Adversarial Routing
Sort
View
ESORICS
2007
Springer
14 years 2 months ago
Synthesizing Secure Protocols
Abstract. We propose a general transformation that maps a cryptographic protocol that is secure in an extremely weak sense (essentially in a model where no adversary is present) in...
Véronique Cortier, Bogdan Warinschi, Eugen ...
CTRSA
2007
Springer
93views Cryptology» more  CTRSA 2007»
13 years 12 months ago
Human Identification Through Image Evaluation Using Secret Predicates
Abstract. The task of developing protocols for humans to securely authenticate themselves to a remote server has been an interesting topic in cryptography as a replacement for the ...
Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungy...
CARDIS
2010
Springer
159views Hardware» more  CARDIS 2010»
13 years 11 months ago
Modeling Privacy for Off-Line RFID Systems
This paper establishes a novel model for RFID schemes where readers are not continuously connected to the back office, but only periodically. Furthermore, adversaries are not only ...
Flavio D. Garcia, Peter van Rossum
FOCS
2010
IEEE
13 years 6 months ago
Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of s...
Ran Canetti, Huijia Lin, Rafael Pass
ISPA
2007
Springer
14 years 2 months ago
A Secure Energy-Efficient Routing Protocol for WSN
The intent of this paper is to propose an energy-efficient routing protocol with data transmission security for wireless sensor networks. We create an energy and distance aware sin...
Al-Sakib Khan Pathan, Choong Seon Hong