Sciweavers

1059 search results - page 77 / 212
» Modeling Security Protocols as Games
Sort
View
SIGCOMM
1997
ACM
14 years 2 months ago
Iolus: A Framework for Scalable Secure Multicasting
As multicast applications are deployed for mainstream use, the need to secure multicast communications will become critical. Multicast, however, does not t the point-to-point mod...
Suvo Mittra
CRYPTO
2009
Springer
144views Cryptology» more  CRYPTO 2009»
14 years 4 months ago
On the Composition of Public-Coin Zero-Knowledge Protocols
Abstract. We show that only languages in BPP have public-coin, blackbox zero-knowledge protocols that are secure under an unbounded (polynomial) number of parallel repetitions. Thi...
Rafael Pass, Wei-Lung Dustin Tseng, Douglas Wikstr...
IJSN
2006
116views more  IJSN 2006»
13 years 10 months ago
Secure collaborations over message boards
: We provide a message board model for collaborative systems, and propose an architecture and protocol for securing collaborative applications over message boards. The proposed arc...
Mahalingam Ramkumar, Nasir D. Memon
JSAC
2007
117views more  JSAC 2007»
13 years 10 months ago
Spectrum sharing for unlicensed bands
We study a spectrum sharing problem in an unlicensed band where multiple systems coexist and interfere with each other. Due to asymmetries and selfish system behavior, unfair and...
Raul Etkin, Abhay Parekh, David Tse
JCP
2006
135views more  JCP 2006»
13 years 10 months ago
Improved Double Auction Protocol based on a Hybrid Trust Model
Recently, Wang et al. proposed a set of double auction protocols with full privacy protection based on distributed ElGamal encryption. Unfortunately, their protocols are expensive ...
JungHoon Ha, Jianying Zhou, Sang-Jae Moon