Sciweavers

1825 search results - page 11 / 365
» Cryptographic Securities Exchanges
Sort
View
CCS
2003
ACM
14 years 4 months ago
A composable cryptographic library with nested operations
Michael Backes, Birgit Pfitzmann, Michael Waidner
ESORICS
2004
Springer
14 years 4 months ago
A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol
We present the first cryptographically sound security proof of the well-known Otway-Rees protocol. More precisely, we show that the protocol is secure against arbitrary active att...
Michael Backes
ICCSA
2009
Springer
14 years 5 months ago
On a Construction of Short Digests for Authenticating Ad Hoc Networks
In pervasive ad-hoc networks, there is a need for devices to be able to communicate securely, despite the lack of apriori shared security associations and the absence of an infrast...
Khoongming Khoo, Ford-Long Wong, Chu-Wee Lim
WCNC
2010
IEEE
13 years 9 months ago
Characterization of the Secrecy Region of a Single Relay Cooperative System
Abstract—Security is an important aspect for the future wireless networks. Since the number of network nodes increases constantly, and, in addition, the networks are decentralize...
Ninoslav Marina, Are Hjørungnes