Sciweavers

1562 search results - page 93 / 313
» Mathematics, Cryptology, Security
Sort
View
FC
2007
Springer
119views Cryptology» more  FC 2007»
14 years 2 months ago
Improving Usability by Adding Security to Video Conferencing Systems
Many video conferencing solutions exist in the market today and many new ones are being introduced. In striving to provide an experience to users as close to “being there” as p...
April Slayden Mitchell, Alan H. Karp
FC
2007
Springer
152views Cryptology» more  FC 2007»
14 years 2 months ago
Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup
Abstract. Bluetooth Simple Pairing and Wi-Fi Protected Setup specify mechanisms for exchanging authentication credentials in wireless networks. Both Simple Pairing and Protected Se...
Cynthia Kuo, Jesse Walker, Adrian Perrig
ACNS
2005
Springer
111views Cryptology» more  ACNS 2005»
14 years 1 months ago
Badger - A Fast and Provably Secure MAC
We present Badger, a new fast and provably secure MAC based on universal hashing. In the construction, a modified tree hash that is more efficient than standard tree hashing is us...
Martin Boesgaard, Thomas Christensen, Erik Zenner
EUROCRYPT
2003
Springer
14 years 1 months ago
A Simpler Construction of CCA2-Secure Public-Key Encryption under General Assumptions
Abstract. In this paper we present a simpler construction of a publickey encryption scheme that achieves adaptive chosen ciphertext security (CCA2), assuming the existence of trapd...
Yehuda Lindell
EUROCRYPT
2003
Springer
14 years 1 months ago
Fair Secure Two-Party Computation
Abstract Benny Pinkas HP Labs Abstract. We demonstrate a transformation of Yao’s protocol for secure two-party computation to a fair protocol in which neither party gains any sub...
Benny Pinkas