Sciweavers

86 search results - page 1 / 18
» Handshake Protocols for De-Synchronization
Sort
View
112
Voted
ASYNC
2004
IEEE
90views Hardware» more  ASYNC 2004»
15 years 7 months ago
Handshake Protocols for De-Synchronization
De-synchronization appears as a new paradigm to automate the design of asynchronous circuits from synchronous netlists. This paper studies different protocols for de-synchronizatio...
Ivan Blunno, Jordi Cortadella, Alex Kondratyev, Lu...
105
Voted
ESAS
2007
Springer
15 years 9 months ago
Private Handshakes
—Nowadays, users are increasingly concerned about individual privacy in cyberspace and Internet. In this paper, we propose the concept of private handshakes with optional account...
Jaap-Henk Hoepman
128
Voted
COMPSEC
2010
124views more  COMPSEC 2010»
15 years 2 months ago
A provably secure secret handshake with dynamic controlled matching
Abstract A Secret Handshake is a protocol that allows two users to mutually verify one another’s properties, and in case of simultaneous matching, to share a key used to secure s...
Alessandro Sorniotti, Refik Molva
121
Voted
WCC
2005
Springer
123views Cryptology» more  WCC 2005»
15 years 9 months ago
RSA-Based Secret Handshakes
A secret handshake mechanism allows two entities, members of a same group, to authenticate each other secretly. This primitive was introduced recently by Balfanz, Durfee, Shankar, ...
Damien Vergnaud
138
Voted
NDSS
2007
IEEE
15 years 10 months ago
Secret Handshakes with Dynamic and Fuzzy Matching
The need for communication privacy over public networks is of growing concern in today’s society. As a result, privacy-preserving authentication and key exchange protocols have ...
Giuseppe Ateniese, Jonathan Kirsch, Marina Blanton