Sciweavers

1833 search results - page 279 / 367
» Mechanized Verification with Sharing
Sort
View
ADHOCNOW
2005
Springer
15 years 10 months ago
Enhancing the Security of On-demand Routing in Ad Hoc Networks
We present the Ad-hoc On-demand Secure Routing (AOSR) protocol, which uses pairwise shared keys between pairs of mobile nodes and hash values keyed with them to verify the validity...
Zhenjiang Li, J. J. Garcia-Luna-Aceves
CRYPTO
2005
Springer
107views Cryptology» more  CRYPTO 2005»
15 years 10 months ago
A Quantum Cipher with Near Optimal Key-Recycling
Abstract. Assuming an insecure quantum channel and an authenticated classical channel, we propose an unconditionally secure scheme for encrypting classical messages under a shared ...
Ivan Damgård, Thomas Brochmann Pedersen 0002...
GPCE
2005
Springer
15 years 10 months ago
Applying a Generative Technique for Enhanced Genericity and Maintainability on the J2EE Platform
One of the themes in building reusable and maintainable software is identifying similarities and designing generic solutions to unify similarity patterns. In this paper, we analyze...
Yang Jun, Stan Jarzabek
IWDW
2005
Springer
15 years 10 months ago
ViWiD : Visible Watermarking Based Defense Against Phishing
In this paper, we present a watermarking based approach, and its implementation, for mitigating phishing attacks - a form of web based identity theft. ViWiD is an integrity check m...
Mercan Topkara, Ashish Kamra, Mikhail J. Atallah, ...
KIVS
2005
Springer
15 years 10 months ago
Combining Service-Orientation and Peer-to-Peer Networks
: Almost all current P2P applications are built as monolithic systems: they tightly couple application software with an underlying P2P technology. For simple P2P applications like ...
Michael Conrad, Jochen Dinger, Hannes Hartenstein,...