Sciweavers

319 search results - page 6 / 64
» Cryptographic Assumptions: A Position Paper
Sort
View
CSFW
2002
IEEE
14 years 3 months ago
Types and Effects for Asymmetric Cryptographic Protocols
We present the first type and effect system for proving authenticity properties of security protocols based on asymmetric cryptography. The most significant new features of our ...
Andrew D. Gordon, Alan Jeffrey
VTC
2007
IEEE
101views Communications» more  VTC 2007»
14 years 5 months ago
Secure Position-Based Routing for VANETs
— Vehicular communication (VC) systems have the potential to improve road safety and driving comfort. Nevertheless, securing the operation is a prerequisite for deployment. So fa...
Charles Harsch, Andreas Festag, Panos Papadimitrat...
IMC
2007
ACM
14 years 13 days ago
Cryptographic strength of ssl/tls servers: current and recent practices
The Secure Socket Layer (SSL) and its variant, Transport Layer Security (TLS), are used toward ensuring server security. In this paper, we characterize the cryptographic strength ...
Homin K. Lee, Tal Malkin, Erich M. Nahum
ACNS
2004
Springer
247views Cryptology» more  ACNS 2004»
14 years 4 months ago
Low-Latency Cryptographic Protection for SCADA Communications
Abstract. Supervisory Control And Data Acquisition (SCADA) systems are real-time process control systems that are widely deployed throughout critical infrastructure sectors includi...
Andrew K. Wright, John A. Kinast, Joe McCarty
WOWMOM
2009
ACM
124views Multimedia» more  WOWMOM 2009»
14 years 5 months ago
VAPS: Positioning with spatial constraints
The proliferation of mobile computing devices and local wireless networks has promoted a growing interest in location-aware systems. The problem with existing positioning techniqu...
Yesid Jarma, Golnaz Karbaschi, Marcelo Dias de Amo...