Sciweavers

1853 search results - page 89 / 371
» Cryptographic Protocols and Network Security
Sort
View
123
Voted
USENIX
1994
15 years 5 months ago
SNP: An Interface for Secure Network Programming
SNP provides a high-level abstraction for secure end-toend network communications. It supports both stream and datagram semantics with security guarantees (e.g., data originauthen...
Thomas Y. C. Woo, Raghuram Bindignavle, Shaowen Su...
CANS
2009
Springer
132views Cryptology» more  CANS 2009»
15 years 8 months ago
Fully Robust Tree-Diffie-Hellman Group Key Exchange
We extend the well-known Tree-Diffie-Hellman technique used for the design of group key exchange (GKE) protocols with robustness, i.e. with resistance to faults resulting from poss...
Timo Brecher, Emmanuel Bresson, Mark Manulis
PST
2008
15 years 5 months ago
Unlinkable Communication
In this paper we present a protocol for unlinkable communication, i.e. where an attacker cannot map the sender and receiver node of a communication. Existing anonymity protocols e...
Volker Fusenig, Eugen Staab, Uli Sorger, Thomas En...
130
Voted
CSFW
2008
IEEE
15 years 6 months ago
A Correctness Proof of a Mesh Security Architecture
The IEEE 802.11s working group is tasked to provide ways of establishing and securing a wireless mesh network. One proposal establishes a Mesh Security Architecture (MSA), with a ...
Doug Kuhlman, Ryan Moriarty, Tony Braskich, Steve ...
135
Voted
STORAGESS
2005
ACM
15 years 9 months ago
Toward securing untrusted storage without public-key operations
Adding security capabilities to shared, remote and untrusted storage file systems leads to performance degradation that limits their use. Public-key cryptographic primitives, wid...
Dalit Naor, Amir Shenhav, Avishai Wool