Sciweavers

2261 search results - page 3 / 453
» Dynamic types for authentication
Sort
View
HUC
2007
Springer
14 years 1 months ago
Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments
Most of today’s authentication schemes involve verifying the identity of a principal in some way. This process is commonly known as entity authentication. In emerging ubiquitous ...
Adrian Leung, Chris J. Mitchell
AMW
2010
13 years 9 months ago
Certification and Authentication of Data Structures
We study query authentication schemes, algorithmic and cryptographic constructions that provide efficient and secure protocols for verifying the results of queries over structured...
Roberto Tamassia, Nikos Triandopoulos
ESAS
2004
Springer
14 years 26 days ago
Exploring Message Authentication in Sensor Networks
Abstract. This paper explores the design space for message authentication in sensor networks. Several types of authentication are put into relation: end-to-end, hop-to-hop, and phy...
Harald Vogt
IFIP
2010
Springer
13 years 2 months ago
Secrecy and Authenticity Types for Secure Distributed Messaging
Abstract. We introduce a calculus with mobile names, distributed principals and primitives for secure remote communication, without any reference to explicit cryptography. The calc...
Michele Bugliesi, Stefano Calzavara, Damiano Maced...
ESOP
2009
Springer
13 years 11 months ago
Type-Based Automated Verification of Authenticity in Cryptographic Protocols
Gordon and Jeffrey have proposed a type and effect system for checking authenticity in cryptographic protocols. The type system reduces the protocol verification problem to the typ...
Daisuke Kikuchi, Naoki Kobayashi