Sciweavers

2421 search results - page 156 / 485
» Message from the Co-Chairs
Sort
View
CRYPTO
1989
Springer
163views Cryptology» more  CRYPTO 1989»
14 years 1 months ago
Undeniable Signatures
Abstract. In this paper, we provide a new approach to study undeniable signatures by translating secure digital signatures to secure undeniable signatures so that the existing algo...
David Chaum, Hans Van Antwerpen
AINA
2007
IEEE
14 years 1 months ago
Specification Synthesis for Monitoring and Analysis of MANET Protocols
This paper introduces an approach to automatic synthesis of the specification models of routing protocol behavior from the observed flow of the network traffic. In particular, our...
Natalia Stakhanova, Samik Basu, Wensheng Zhang, Xi...
CSFW
2010
IEEE
14 years 1 months ago
Analysing Unlinkability and Anonymity Using the Applied Pi Calculus
—An attacker that can identify messages as coming from the same source, can use this information to build up a picture of targets’ behaviour, and so, threaten their privacy. In...
Myrto Arapinis, Tom Chothia, Eike Ritter, Mark Rya...
FC
2010
Springer
163views Cryptology» more  FC 2010»
14 years 1 months ago
A Traceability Attack against e-Passports
Since 2004, many nations have started issuing “e-passports” containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secur...
Tom Chothia, Vitaliy Smirnov
GLOBECOM
2009
IEEE
14 years 1 months ago
Distributed Averaging in Dense Wireless Networks
We consider the effect of network throughput on the convergence of a specific class of distributed averaging algorithms, called consensus algorithms. These algorithms rely on itera...
Sundaram Vanka, Martin Haenggi, Vijay Gupta