Sciweavers

462 search results - page 44 / 93
» Authentication of Quantum Messages
Sort
View
TCS
2002
15 years 2 months ago
Authentication tests and the structure of bundles
Suppose a principal in a cryptographic protocol creates and transmits a message containing a new value v, later receiving v back in a different cryptographic context. It can concl...
Joshua D. Guttman, F. Javier Thayer
CTRSA
2010
Springer
169views Cryptology» more  CTRSA 2010»
15 years 10 months ago
Hash Function Combiners in TLS and SSL
Abstract. The TLS and SSL protocols are widely used to ensure secure communication over an untrusted network. Therein, a client and server first engage in the so-called handshake ...
Marc Fischlin, Anja Lehmann, Daniel Wagner
SPW
2005
Springer
15 years 8 months ago
Multi-channel Protocols
We examine several ad-hoc pairing protocols that strengthen their radio exchanges with additional transmissions over another channel, for example a screen showing graphically encod...
Ford-Long Wong
118
Voted
TCC
2009
Springer
132views Cryptology» more  TCC 2009»
16 years 3 months ago
Authenticated Adversarial Routing
: The aim of this paper is to demonstrate the feasibility of authenticated throughput-ecient routing in an unreliable and dynamically changing synchronous network in which the majo...
Yair Amir, Paul Bunn, Rafail Ostrovsky
90
Voted
AICCSA
2005
IEEE
87views Hardware» more  AICCSA 2005»
15 years 9 months ago
A XML format secure protocol - OpenSST
OpenSST (Open Simple Secure Transaction) is a free software project and aims to create an efficient, open and secure alternative to the secure proprietary transaction protocol. Op...
Xinhua Zhang, Chunyan Jiang, Wanjun Huang, Christo...