Sciweavers

2699 search results - page 35 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
AP2PS
2009
IEEE
14 years 24 days ago
Performance Evaluation of a Chord-Based JXTA Implementation
In this paper, we propose a new implementation of the JXTA framework, based on the integration of the original JXTA version with the Chord DHT management protocol. The resulting ne...
Carlo Nocentini, Pilu Crescenzi, Leonardo Lanzi
COMPSAC
2011
IEEE
12 years 8 months ago
L1 - An Intermediate Language for Mixed-Protocol Secure Computation
—Secure Computation (SC) enables secure distributed computation of arbitrary functions of private inputs. It has many useful applications, e.g. benchmarking or auctions. Several ...
Axel Schröpfer, Florian Kerschbaum, Guenter M...
ACISP
2008
Springer
13 years 10 months ago
Efficient One-Round Key Exchange in the Standard Model
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of...
Colin Boyd, Yvonne Cliff, Juan Manuel Gonzá...
CTRSA
2007
Springer
93views Cryptology» more  CTRSA 2007»
14 years 22 days ago
Human Identification Through Image Evaluation Using Secret Predicates
Abstract. The task of developing protocols for humans to securely authenticate themselves to a remote server has been an interesting topic in cryptography as a replacement for the ...
Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungy...
JNW
2008
177views more  JNW 2008»
13 years 8 months ago
Design and Evaluation of a Novel HIP-Based Network Mobility Protocol
The rapid growth of IP-based mobile telecommunication technologies in the past few years has revealed situations where not only a single node but an entire network moves and change...
Szabolcs Nováczki, László Bok...