Sciweavers

461 search results - page 79 / 93
» Developing security protocols by refinement
Sort
View
IACR
2011
120views more  IACR 2011»
12 years 7 months ago
Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
We present new candidates for quantum-resistant public-key cryptosystems based on the conjectured difficulty of finding isogenies between supersingular elliptic curves. The main t...
David Jao, Luca De Feo
IEEEARES
2009
IEEE
14 years 2 months ago
Measuring Voter-Controlled Privacy
—In voting, the notion of receipt-freeness has been proposed to express that a voter cannot gain any information to prove that she has voted in a certain way. It aims to prevent ...
Hugo L. Jonker, Sjouke Mauw, Jun Pang
ITNG
2008
IEEE
14 years 2 months ago
A Framework for Agent-Based Trust Management in Online Auctions
Current electronic commerce applications such as online auction systems are not trustworthy due to a lack of effective trust management mechanisms. A trustworthy online auction sy...
Haiping Xu, Sol M. Shatz, Christopher K. Bates
GLOBECOM
2007
IEEE
14 years 2 months ago
Passive Listening and Intrusion Management in Commodity Wi-Fi Networks
—We examine a widely accepted myth about passive listening in wireless networks, and give a detailed description of how to achieve real “passive listening.” Then we develop a...
Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng
ACSAC
2005
IEEE
14 years 1 months ago
ScriptGen: an automated script generation tool for honeyd
Honeyd [14] is a popular tool developed by Niels Provos that offers a simple way to emulate services offered by several machines on a single PC. It is a so called low interaction ...
Corrado Leita, Ken Mermoud, Marc Dacier