Sciweavers

1853 search results - page 157 / 371
» Cryptographic Protocols and Network Security
Sort
View
CSREASAM
2006
15 years 6 months ago
Finding Minimum Optimal Path Securely Using Homomorphic Encryption Schemes in Computer Networks
- In this paper we find a secure routing protocol for computer networks, which finds minimum optimum path using homomorphic encryption schemes. We briefly look into the existing ho...
Levent Ertaul, Vaidehi Kedlaya
COMPSAC
2003
IEEE
15 years 10 months ago
Facilitating Secure Ad hoc Service Discovery in Public Environments
Securely accessing unfamiliar services in public environments using ad hoc wireless networks is challenging. We present a proxy-based approach that uses other existing network cha...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
JOC
2011
157views more  JOC 2011»
14 years 11 months ago
Universally Composable Symbolic Security Analysis
In light of the growing complexity of cryptographic protocols and applications, it becomes highly desirable to mechanize — and eventually automate — the security analysis of p...
Ran Canetti, Jonathan Herzog
HICSS
2005
IEEE
144views Biometrics» more  HICSS 2005»
15 years 10 months ago
Secure Dynamic Source Routing
— In this paper we present the Secure Dynamic Source Routing protocol for Mobile Ad hoc Networks that prevents a lot of potential attacks to these kind of networks. We also prese...
Frank Kargl, Alfred Geiss, Stefan Schlott, Michael...
NGC
2002
Springer
15 years 4 months ago
Offering a Multicast Delivery Service in a Programmable Secure IP VPN Environment
The programmable network approach is one possible solution to quickly adapt existing infrastructures to new requirements. This paper shows how programmable networking can be explo...
Lina Alchaal, Vincent Roca, Michel Habert