Sciweavers

3088 search results - page 194 / 618
» Multichannel Security Protocols
Sort
View
INFOCOM
1996
IEEE
14 years 2 months ago
Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions
The Transmission Control Protocol Internet Protocol TCP IP 1 suite is a very widely used technique that is employed to interconnect computing facilities in modern network environm...
Biswaroop Guha, Biswanath Mukherjee
ASIAN
2007
Springer
76views Algorithms» more  ASIAN 2007»
14 years 2 months ago
Secure Verification of Location Claims with Simultaneous Distance Modification
We investigate the problem of verifying location claims of mobile devices, and propose a new property called simultaneous distance modification (SDM). In localization protocols sat...
Vitaly Shmatikov, Ming-Hsiu Wang
CTRSA
2009
Springer
179views Cryptology» more  CTRSA 2009»
14 years 5 months ago
Adaptively Secure Two-Party Computation with Erasures
In the setting of multiparty computation a set of parties with private inputs wish to compute some joint function of their inputs, whilst preserving certain security properties (l...
Andrew Y. Lindell
CSFW
2009
IEEE
14 years 4 months ago
Minimal Message Complexity of Asynchronous Multi-party Contract Signing
Multi-party contract signing protocols specify how a number of signers can cooperate in achieving a fully signed contract, even in the presence of dishonest signers. This problem h...
Sjouke Mauw, Sasa Radomirovic, Mohammad Torabi Das...
CRYPTO
2001
Springer
153views Cryptology» more  CRYPTO 2001»
14 years 2 months ago
Universally Composable Commitments
d Abstract) Ran Canetti and Marc Fischlin Abstract. We propose a new security measure for commitment protocols, called Universally Composable (UC) Commitment. The measure guarantee...
Ran Canetti, Marc Fischlin