Sciweavers

3088 search results - page 194 / 618
» Multichannel Security Protocols
Sort
View
INFOCOM
1996
IEEE
15 years 7 months ago
Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions
The Transmission Control Protocol Internet Protocol TCP IP 1 suite is a very widely used technique that is employed to interconnect computing facilities in modern network environm...
Biswaroop Guha, Biswanath Mukherjee
ASIAN
2007
Springer
76views Algorithms» more  ASIAN 2007»
15 years 6 months ago
Secure Verification of Location Claims with Simultaneous Distance Modification
We investigate the problem of verifying location claims of mobile devices, and propose a new property called simultaneous distance modification (SDM). In localization protocols sat...
Vitaly Shmatikov, Ming-Hsiu Wang
CTRSA
2009
Springer
179views Cryptology» more  CTRSA 2009»
15 years 9 months ago
Adaptively Secure Two-Party Computation with Erasures
In the setting of multiparty computation a set of parties with private inputs wish to compute some joint function of their inputs, whilst preserving certain security properties (l...
Andrew Y. Lindell
CSFW
2009
IEEE
15 years 9 months ago
Minimal Message Complexity of Asynchronous Multi-party Contract Signing
Multi-party contract signing protocols specify how a number of signers can cooperate in achieving a fully signed contract, even in the presence of dishonest signers. This problem h...
Sjouke Mauw, Sasa Radomirovic, Mohammad Torabi Das...
126
Voted
CRYPTO
2001
Springer
153views Cryptology» more  CRYPTO 2001»
15 years 7 months ago
Universally Composable Commitments
d Abstract) Ran Canetti and Marc Fischlin Abstract. We propose a new security measure for commitment protocols, called Universally Composable (UC) Commitment. The measure guarantee...
Ran Canetti, Marc Fischlin