Sciweavers

86 search results - page 6 / 18
» Handshake Protocols for De-Synchronization
Sort
View
CTRSA
2008
Springer
137views Cryptology» more  CTRSA 2008»
14 years 19 days ago
Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange
Public key based authentication and key exchange protocols are not usually designed with privacy in mind and thus involve cleartext exchanges of identities and certificates before ...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
CTRSA
2007
Springer
147views Cryptology» more  CTRSA 2007»
14 years 2 months ago
Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement
Privacy concerns in many aspects of electronic communication trigger the need to re-examine
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
CDES
2010
184views Hardware» more  CDES 2010»
13 years 9 months ago
Delay-Insensitive Cell Matrix
This paper describes the design of a delay-insensitive (DI) Cell Matrix. This architecture allows for massively parallel, self-determined operation and can be used to implement reg...
Scott Smith, David Roclin, Jia Di
CSFW
2009
IEEE
14 years 5 months ago
ASPIER: An Automated Framework for Verifying Security Protocol Implementations
Abstract. We present aspier – the first framework that combines software model checking with a standard protocol security model to analyze authentication and secrecy properties ...
Sagar Chaki, Anupam Datta
GLOBECOM
2008
IEEE
14 years 5 months ago
MACA-U: A Media Access Protocol for Underwater Acoustic Networks
—Unlike terrestrial wireless communication which uses radio waves, underwater communication relies on acoustic waves. The long latency and limited bandwidth pose great challenges...
Hai-Heng Ng, Wee-Seng Soh, Mehul Motani