Sciweavers

2699 search results - page 61 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
EUROPKI
2009
Springer
13 years 6 months ago
A Secure and Efficient Authenticated Diffie-Hellman Protocol
The Exponential Challenge Response (XRC) and Dual Exponential Challenge Response (DCR) signature schemes are the building blocks of the HMQV protocol. We propose a complementary an...
Augustin P. Sarr, Philippe Elbaz-Vincent, Jean-Cla...
AWIC
2003
Springer
14 years 2 months ago
Secure Intelligent Agents Based on Formal Description Techniques
This paper describes a practical solution for the incorporation of security services in agents. From a set of basic user requirements, the agents will be able to find out the best ...
L. Mengual, C. de la Puente
SEC
2001
13 years 10 months ago
Security Analysis of the Cliques Protocols Suites: First Results
: The Cliques protocols are extensions of the Diffie-Hellman key exchange protocol to a group setting. In this paper, we are analysing the A-GDH.2 suite that is intended to allow a...
Olivier Pereira, Jean-Jacques Quisquater
INFOCOM
1993
IEEE
14 years 1 months ago
Experimental Evaluation of SunOS IPC and TCP/IP Protocol Implementation
Progress in the field of high speed networking and distributed applications has led to a debate in the research community on the suitability of existing protocols such as TCP/IP ...
Christos Papadopoulos, Guru M. Parulkar
MOBIQUITOUS
2007
IEEE
14 years 3 months ago
Key Establishment Using Secure Distance Bounding Protocols
Key establishment is one of the major challenges in Wireless Personal Area Networks, as traditional security mechanisms often do not cope with the dynamic characteristics of wirel...
Dave Singelée, Bart Preneel