Sciweavers

783 search results - page 145 / 157
» On security proof of McCullagh
Sort
View
ITNG
2006
IEEE
14 years 2 months ago
Two-Party Private Vector Dominance: The All-Or-Nothing Deal
Alice holds a secret integer a while Bob holds a secret integer b, they want to decide on the predicate a > b with no information revealed other than the result. This is the we...
Maged Hamada Ibrahim
MOMM
2006
ACM
168views Communications» more  MOMM 2006»
14 years 2 months ago
Mobile P2P Web Service Creation using SIP
: Telecommunication networks and the Internet are growing together. Peer-to-Peer (P2P) services which are originally offered by network providers, like telephony and messaging, ar...
Guido Gehlen, Fahad Aijaz, Yi Zhu, Bernhard Walke
SOUPS
2006
ACM
14 years 2 months ago
Human selection of mnemonic phrase-based passwords
Textual passwords are often the only mechanism used to authenticate users of a networked system. Unfortunately, many passwords are easily guessed or cracked. In an attempt to stre...
Cynthia Kuo, Sasha Romanosky, Lorrie Faith Cranor
ACNS
2005
Springer
116views Cryptology» more  ACNS 2005»
14 years 2 months ago
Two-Server Password-Only Authenticated Key Exchange
Typical protocols for password-based authentication assume a single server which stores all the information (e.g., the password) necessary to authenticate a user. Unfortunately, a...
Jonathan Katz, Philip D. MacKenzie, Gelareh Taban,...
ASIACRYPT
2005
Springer
14 years 2 months ago
Spreading Alerts Quietly and the Subgroup Escape Problem
We introduce a new cryptographic primitive called the blind coupon mechanism (BCM). In effect, the BCM is an authenticated bit commitment scheme, which is AND-homomorphic. It has n...
James Aspnes, Zoë Diamadi, Kristian Gjø...