Sciweavers

1853 search results - page 5 / 371
» Cryptographic Protocols and Network Security
Sort
View
SAINT
2003
IEEE
15 years 8 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta
WCNC
2008
IEEE
15 years 9 months ago
A Secure Routing Protocol in Proactive Security Approach for Mobile Ad-Hoc Networks
—Secure routing of Mobile Ad-hoc Networks (MANETs) is still a hard problem after years of research. We therefore propose to design a secure routing protocol in a new approach. Th...
Shushan Zhao, Akshai K. Aggarwal, Shuping Liu, Hua...
101
Voted
CSFW
2008
IEEE
15 years 9 months ago
Cryptographically-Sound Protocol-Model Abstractions
Christoph Sprenger, David A. Basin
74
Voted
CCS
1997
ACM
15 years 7 months ago
A Calculus for Cryptographic Protocols: The Spi Calculus
Martín Abadi, Andrew D. Gordon