Sciweavers

1853 search results - page 116 / 371
» Cryptographic Protocols and Network Security
Sort
View
JSS
2006
65views more  JSS 2006»
15 years 4 months ago
Cryptanalysis of a hybrid authentication protocol for large mobile networks
In this paper we analyse a hybrid authentication protocol due to Chien and Jan, designed for use in large mobile networks. The proposed protocol consists of two sub-protocols, nam...
Qiang Tang, Chris J. Mitchell
CSFW
2007
IEEE
15 years 10 months ago
Approximated Computationally Bounded Simulation Relations for Probabilistic Automata
We study simulation relations for Probabilistic Automata that require transitions to be matched up to negligible sets provided that computation lengths are polynomially bounded. T...
Roberto Segala, Andrea Turrini
TCC
2009
Springer
184views Cryptology» more  TCC 2009»
16 years 5 months ago
Secure Arithmetic Computation with No Honest Majority
We study the complexity of securely evaluating arithmetic circuits over finite rings. This question is motivated by natural secure computation tasks. Focusing mainly on the case o...
Yuval Ishai, Manoj Prabhakaran, Amit Sahai
ISPA
2007
Springer
15 years 10 months ago
A Secure Energy-Efficient Routing Protocol for WSN
The intent of this paper is to propose an energy-efficient routing protocol with data transmission security for wireless sensor networks. We create an energy and distance aware sin...
Al-Sakib Khan Pathan, Choong Seon Hong
ICALP
2005
Springer
15 years 10 months ago
Password-Based Encryption Analyzed
Abstract. The use of passwords in security protocols is particularly delicate because of the possibility of off-line guessing attacks. We study password-based protocols in the cont...
Martín Abadi, Bogdan Warinschi