Sciweavers

1853 search results - page 172 / 371
» Cryptographic Protocols and Network Security
Sort
View
PERCOM
2008
ACM
15 years 4 months ago
Providing Security and Privacy in RFID Systems Using Triggered Hash Chains
RFID technology shall increase security, e.g. by helping to prevent counterfeiting. But the technology also causes privacy issues. In this paper, after highlighting goals and prob...
Dirk Henrici, Paul Müller
ASIACRYPT
1999
Springer
15 years 9 months ago
Approximation Hardness and Secure Communication in Broadcast Channels
Problems of secure communication and computation have been studied extensively in network models. Goldreich, Goldwasser, and Linial, Franklin and Yung, and Franklin and Wright have...
Yvo Desmedt, Yongge Wang
CCS
2008
ACM
15 years 6 months ago
Provably secure browser-based user-aware mutual authentication over TLS
The standard solution for user authentication on the Web is to establish a TLS-based secure channel in server authenticated mode and run a protocol on top of TLS where the user en...
Sebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi,...
126
Voted
ACSAC
1999
IEEE
15 years 9 months ago
Secure Communications in ATM Networks
The ATM Forum international consortium recently approved the first version of its security specifications aiming to protect communications over Asynchronous Transfer Mode (ATM) ne...
Maryline Laurent, Ahmed Bouabdallah, Christophe De...
ISTA
2004
15 years 6 months ago
On a Network Forensics Model For Information Security
: The employment of a patchwork of nonintegrated security products can only provide incomplete coverage, which cannot give the total panorama of the network misuse behavior. Networ...
Wei Ren