Sciweavers

1853 search results - page 268 / 371
» Cryptographic Protocols and Network Security
Sort
View
140
Voted
EUROCRYPT
2004
Springer
15 years 8 months ago
Anonymous Identification in Ad Hoc Groups
We introduce Ad Hoc Anonymous Identification schemes, a new multi-user cryptographic primitive that allows participants from a user population to form ad hoc groups, and then prove...
Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi,...
CRYPTO
2008
Springer
98views Cryptology» more  CRYPTO 2008»
15 years 6 months ago
One-Time Programs
Abstract. In this work, we introduce one-time programs, a new computational paradigm geared towards security applications. A one-time program can be executed on a single input, who...
Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothbl...
SIGCOMM
2000
ACM
15 years 8 months ago
FIRE: Flexible intra-AS routing environment
Current routing protocols are monolithic, specifying the algorithm used to construct forwarding tables, the metric used by the algorithm (generally some form of hop-count), and th...
Craig Partridge, Alex C. Snoeren, W. Timothy Stray...
AGENTS
1998
Springer
15 years 8 months ago
Market-Based Resource Control for Mobile Agents
Mobile agents are programs that can migrate from machine to machine in a heterogeneous, partially disconnected network. As mobile agents move across a network, they consume resour...
Jonathan Bredin, David Kotz, Daniela Rus
ICISC
2008
129views Cryptology» more  ICISC 2008»
15 years 5 months ago
Novel PUF-Based Error Detection Methods in Finite State Machines
We propose a number of techniques for securing finite state machines (FSMs) against fault injection attacks. The proposed security mechanisms are based on physically unclonable fun...
Ghaith Hammouri, Kahraman D. Akdemir, Berk Sunar