Sciweavers

5324 search results - page 858 / 1065
» Internet Security Protocols
Sort
View
FC
2010
Springer
163views Cryptology» more  FC 2010»
14 years 1 months ago
A Traceability Attack against e-Passports
Since 2004, many nations have started issuing “e-passports” containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secur...
Tom Chothia, Vitaliy Smirnov
FC
2010
Springer
191views Cryptology» more  FC 2010»
14 years 1 months ago
Using Sphinx to Improve Onion Routing Circuit Construction
This paper presents compact message formats for onion routing circuit construction using the Sphinx methodology developed for mixes. We significantly compress the circuit constru...
Aniket Kate, Ian Goldberg
ASIAN
2006
Springer
91views Algorithms» more  ASIAN 2006»
14 years 1 months ago
A Type-Theoretic Framework for Formal Reasoning with Different Logical Foundations
Abstract. A type-theoretic framework for formal reasoning with different logical foundations is introduced and studied. With logic-enriched type theories formulated in a logical fr...
Zhaohui Luo
CARDIS
2006
Springer
123views Hardware» more  CARDIS 2006»
14 years 1 months ago
Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability
In this paper we propose three smartcard-based variants of anonymous authentication using unique one-time pseudonyms. The first variant can be used to authenticate a user. However,...
Martin Schaffer, Peter Schartner
DCOSS
2006
Springer
14 years 1 months ago
Locating Compromised Sensor Nodes Through Incremental Hashing Authentication
Abstract. While sensor networks have recently emerged as a promising computing model, they are vulnerable to various node compromising attacks. In this paper, we propose COOL, a CO...
Youtao Zhang, Jun Yang 0002, Lingling Jin, Weijia ...