Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
We study the problem of authentication based on a weak key in the information-theoretic setting. A key is weak if its min-entropy is an arbitrary small fraction of its bit length. ...
We present a security design for a general purpose, selforganizing, multihop ad hoc wireless network, based on the IEEE 802.15.4 low-rate wireless personal area network standard. ...
Thomas S. Messerges, Johnas Cukier, Tom A. M. Keve...
Many applications of mix networks such as anonymous Web browsing require relationship anonymity: it should be hard for the attacker to determine who is communicating with whom. Co...
Web applications divide their state between the client and the server. The frequent and highly dynamic client-server communication that is characteristic of modern web application...