Sciweavers

3751 search results - page 50 / 751
» Events in security protocols
Sort
View
ESORICS
1998
Springer
14 years 1 months ago
Authentication and Payment in Future Mobile Systems
Abstract. This article presents an efficient public-key protocol for mutual authentication and key exchange designed for third generation mobile communications systems. The paper a...
Günther Horn, Bart Preneel
FC
2010
Springer
196views Cryptology» more  FC 2010»
13 years 10 months ago
Secure Computation with Fixed-Point Numbers
Abstract. Secure computation is a promising approach to business problems in which several parties want to run a joint application and cannot reveal their inputs. Secure computatio...
Octavian Catrina, Amitabh Saxena
NTMS
2008
IEEE
14 years 3 months ago
On the Authentication of RFID Systems with Bitwise Operations
—Due to the stringent computational capabilities of low-cost RFID tags, many lightweight authentication protocols have been proposed recently aiming to achieve secure authenticat...
Basel Alomair, Radha Poovendran
CORR
2010
Springer
83views Education» more  CORR 2010»
13 years 8 months ago
A Platform for Implementing Secure Wireless Ad Hoc Networks
: We propose a new platform for implementing secure wireless ad hoc networks. Our proposal is based on a modular architecture, with the software stack constructed directly on the E...
Gyula Farkas, Béla Genge, Piroska Haller
CONCUR
2008
Springer
13 years 10 months ago
Modeling Computational Security in Long-Lived Systems
Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...