Sciweavers

2699 search results - page 12 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
WISTP
2010
Springer
14 years 2 months ago
Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions
Protocols for bootstrapping security in ad hoc mobile device interactions rely on users’ ability to perform specific tasks such as transferring or comparing fingerprints of inf...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
ACNS
2009
Springer
123views Cryptology» more  ACNS 2009»
14 years 2 months ago
Practical Secure Evaluation of Semi-private Functions
Abstract. Two-party Secure Function Evaluation (SFE) is a very useful cryptographic tool which allows two parties to evaluate a function known to both parties on their private (sec...
Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider
ICC
2007
IEEE
14 years 1 months ago
A Multilink Protocol with the Per Flow Resequencing and Its Performance Evaluation
Abstract— Procedures that provide a virtual link service aggregating bandwidths of multiple physical links are called a multilink protocol. The multilink protocol enables to util...
Toshihiro Shikama, Takashi Watanabe, Tadanori Mizu...
MASS
2010
156views Communications» more  MASS 2010»
13 years 5 months ago
On application of Host Identity Protocol in wireless sensor networks
Recent advances in development of low-cost wireless sensor platforms open up opportunities for novel wireless sensor network (WSN) applications. Likewise emerge security concerns o...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov
SP
2008
IEEE
195views Security Privacy» more  SP 2008»
14 years 1 months ago
Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage
We study formal security properties of a state-of-the-art protocol for secure file sharing on untrusted storage, in the automatic protocol verifier ProVerif. As far as we know, ...
Bruno Blanchet, Avik Chaudhuri