Sciweavers

86 search results - page 2 / 18
» Handshake Protocols for De-Synchronization
Sort
View
CTRSA
2010
Springer
169views Cryptology» more  CTRSA 2010»
14 years 2 months ago
Hash Function Combiners in TLS and SSL
Abstract. The TLS and SSL protocols are widely used to ensure secure communication over an untrusted network. Therein, a client and server first engage in the so-called handshake ...
Marc Fischlin, Anja Lehmann, Daniel Wagner
ACNS
2006
Springer
121views Cryptology» more  ACNS 2006»
14 years 1 months ago
Authentication for Paranoids: Multi-party Secret Handshakes
In a society increasingly concerned with the steady assault on electronic privacy, the need for privacy-preserving techniques is both natural and justified. This need extends to t...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
CTRSA
2001
Springer
108views Cryptology» more  CTRSA 2001»
13 years 12 months ago
Improving SSL Handshake Performance via Batching
We present an algorithmic approach for speeding up SSL’s performance on a web server. Our approach improves the performance of SSL’s handshake protocol by up to a factor of 2....
Hovav Shacham, Dan Boneh
LCN
2006
IEEE
14 years 1 months ago
Ethernet Adaptive Link Rate (ALR): Analysis of a MAC Handshake Protocol
Himanshu Anand, Casey Reardon, Rajagopal Subramani...
MOBICOM
1999
ACM
13 years 11 months ago
Reversing the Collision-Avoidance Handshake in Wireless Networks
Many medium-access control (MAC) protocols for wireless networks proposed or implemented to date are based on collisionavoidance handshakes between sender and receiver. In the vas...
J. J. Garcia-Luna-Aceves, Asimakis Tzamaloukas