Sciweavers

1853 search results - page 156 / 371
» Cryptographic Protocols and Network Security
Sort
View
CORR
2006
Springer
206views Education» more  CORR 2006»
15 years 4 months ago
ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) a significant researcher's attention, due to its innate capabilities of instant commu...
Tomasz Ciszkowski, Zbigniew Kotulski
POPL
2000
ACM
15 years 9 months ago
Authentication Primitives and Their Compilation
Adopting a programming-language perspective, we study the problem of implementing authentication in a distributed system. We define a process calculus with constructs for authent...
Martín Abadi, Cédric Fournet, George...
ACSW
2003
15 years 6 months ago
Security in Mobile Communications: Challenges and Opportunities
The nature of mobile communication, characterised for example by terminals having poor user interface and limited processing capacity, as well as complex combination of network pr...
Audun Jøsang, Gunnar Sanderud
CORR
2006
Springer
82views Education» more  CORR 2006»
15 years 4 months ago
Explicit Randomness is not Necessary when Modeling Probabilistic Encryption
Although good encryption functions are probabilistic, most symbolic models do not capture this aspect explicitly. A typical solution, recently used to prove the soundness of such ...
Véronique Cortier, Heinrich Hördegen, ...
CRYPTO
2003
Springer
96views Cryptology» more  CRYPTO 2003»
15 years 10 months ago
Scalable Protocols for Authenticated Group Key Exchange
We consider the fundamental problem of authenticated group key exchange among n parties within a larger and insecure public network. A number of solutions to this problem have bee...
Jonathan Katz, Moti Yung