Sciweavers

3088 search results - page 197 / 618
» Multichannel Security Protocols
Sort
View
138
Voted
ASIACRYPT
2010
Springer
15 years 23 days ago
Optimistic Concurrent Zero Knowledge
We design cryptographic protocols that recognize best case (optimistic) situations and exploit them. As a case study, we present a new concurrent zeroknowledge protocol that is exp...
Alon Rosen, Abhi Shelat
124
Voted
ICECCS
2005
IEEE
136views Hardware» more  ICECCS 2005»
15 years 8 months ago
Model-Based Design and Analysis of Permission-Based Security
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
Jan Jürjens, Markus Lehrhuber, Guido Wimmel
125
Voted
TCC
2009
Springer
130views Cryptology» more  TCC 2009»
16 years 3 months ago
Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer
In the setting of secure computation, a set of parties wish to securely compute some function of their inputs, in the presence of an adversary. The adversary in question may be st...
Yehuda Lindell, Hila Zarosim
117
Voted
EUROCRYPT
2004
Springer
15 years 8 months ago
Multi-party Computation with Hybrid Security
It is well-known that n players connected only by pairwise secure channels can achieve multi-party computation secure against an active adversary if and only if – t < n/2 of t...
Matthias Fitzi, Thomas Holenstein, Jürg Wulls...
PERCOM
2010
ACM
15 years 1 months ago
An integrated system for secure code distribution in Wireless Sensor Networks
—This paper presents a Secure Code Update (SCU) system for Wireless Sensor Networks (WSNs). This solution achieves different security goals. First, through a dedicated authentica...
Nicola Bui, Osman Ugus, Moreno Dissegna, Michele R...