Sciweavers

5488 search results - page 150 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
STOC
2002
ACM
130views Algorithms» more  STOC 2002»
16 years 4 months ago
Secure multi-party quantum computation
Secure multi-party computing, also called secure function evaluation, has been extensively studied in classical cryptography. We consider the extension of this task to computation...
Claude Crépeau, Daniel Gottesman, Adam Smit...
FSTTCS
2010
Springer
15 years 2 months ago
Computationally Sound Abstraction and Verification of Secure Multi-Party Computations
ionally Sound Abstraction and Verification of Secure Multi-Party Computations Michael Backes Saarland University MPI-SWS Matteo Maffei Saarland University Esfandiar Mohammadi Saarl...
Michael Backes, Matteo Maffei, Esfandiar Mohammadi
ISW
2007
Springer
15 years 10 months ago
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension
Abstract. We study the provable security of identity-based (ID-based) key agreement protocols. Although several published protocols have been proven secure in the random oracle mod...
Sherman S. M. Chow, Kim-Kwang Raymond Choo
143
Voted
WS
2004
ACM
15 years 10 months ago
JANUS: towards robust and malicious resilient routing in hybrid wireless networks
In this paper we investigate and provide solutions for security threats in the context of hybrid networks consisting of a cellular base station and mobile devices equipped with du...
Bogdan Carbunar, Ioannis Ioannidis, Cristina Nita-...
WECWIS
2002
IEEE
106views ECommerce» more  WECWIS 2002»
15 years 9 months ago
I-DG: A Secure Protocol for Disseminating Data to Subscribers via IP Multicast
This paper proposes the IP Multicast-enabled Drop Groups (I-DG) protocol as a solution to the problem of efficiently and securely disseminating information to a large number of s...
Aslihan Celik, JoAnne Holliday, Bindumadhavi Ramav...