Sciweavers

299 search results - page 10 / 60
» Deniable Authentication on the Internet
Sort
View
SIGCOMM
2010
ACM
13 years 7 months ago
Encrypting the internet
End-to-end communication encryption is considered necessary for protecting the privacy of user data in the Internet. Only a small fraction of all Internet traffic, however, is pro...
Michael E. Kounavis, Xiaozhu Kang, Ken Grewal, Mat...
HOTDEP
2008
114views Hardware» more  HOTDEP 2008»
13 years 10 months ago
Pretty Good Packet Authentication
Internet addresses are routinely being used to infer the identity of persons who send offending traffic
Andreas Haeberlen, Rodrigo Rodrigues, P. Krishna G...
IJNSEC
2008
146views more  IJNSEC 2008»
13 years 7 months ago
Formal Protocol Design of ESIKE Based on Authentication Tests
In this paper, we first present a concrete formal protocol design approach, which is based on authentication tests, to create an Efficient and Secure Internet Key Exchange (ESIKE)...
Rui Jiang, Aiqun Hu, Jianhua Li
AINA
2006
IEEE
14 years 1 months ago
MIS Protocol for Secure Connection and Fast Handover on Wireless LAN
MIS (Mobile Internet Services) architecture is designed for secure connection and fast handover with wireless LAN. This architecture consists of three protocols, MISP (Mobile Inte...
Hitoshi Morioka, Hiroshi Mano, Motoyuki Ohrnori, M...
RFIDSEC
2010
13 years 2 months ago
EC-RAC: Enriching a Capacious RFID Attack Collection
Abstract. We demonstrate two classes of attacks on EC-RAC, a growing set of RFID protocols. Our first class of attacks concerns the compositional approach used to construct a parti...
Ton van Deursen, Sasa Radomirovic