Sciweavers

5891 search results - page 36 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
152
Voted
IDTRUST
2010
ACM
15 years 2 months ago
A proposal for collaborative internet-scale trust infrastructures deployment: the public key system (PKS)
Public Key technology is about multiple parties across different domains making assertions that can be chained together to make trust judgments. Today, the need for more interoper...
Massimiliano Pala
USS
2008
15 years 5 months ago
Unidirectional Key Distribution Across Time and Space with Applications to RFID Security
We explore the problem of secret-key distribution in unidirectional channels, those in which a sender transmits information blindly to a receiver. We consider two approaches: (1) ...
Ari Juels, Ravikanth Pappu, Bryan Parno
52
Voted
CORR
2010
Springer
47views Education» more  CORR 2010»
15 years 3 months ago
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration
Alan Mink, Sheila Frankel, Ray A. Perlner
124
Voted
CSFW
1997
IEEE
15 years 7 months ago
Unreliable Intrusion Detection in Distributed Computations
Dahlia Malkhi, Michael K. Reiter
IMA
1997
Springer
211views Cryptology» more  IMA 1997»
15 years 7 months ago
Key Agreement Protocols and Their Security Analysis
This paper proposes new protocols for two goals: authenticated key agreement and authenticated key agreement with key con rmation in the asymmetric public-key setting. A formalm...
Simon Blake-Wilson, Don Johnson, Alfred Menezes