Sciweavers

609 search results - page 19 / 122
» One-Time-Password-Authenticated Key Exchange
Sort
View
ACNS
2005
Springer
97views Cryptology» more  ACNS 2005»
14 years 1 months ago
Thompson's Group and Public Key Cryptography
Recently, several public key exchange protocols based on symbolic computation in non-commutative (semi)groups were proposed as a more efficient alternative to well established prot...
Vladimir Shpilrain, Alexander Ushakov
NDSS
2002
IEEE
14 years 15 days ago
Talking to Strangers: Authentication in Ad-Hoc Wireless Networks
In this paper we address the problem of secure communication and authentication in ad-hoc wireless networks. This is a difficult problem, as it involves bootstrapping trust betwe...
Dirk Balfanz, Diana K. Smetters, Paul Stewart, H. ...
ACISP
2005
Springer
14 years 1 months ago
Analysis of the HIP Base Exchange Protocol
Abstract The Host Identity Protocol (HIP) is an Internet security and multiaddressing mechanism specified by the IETF. HIP introduces a new layer between the transport and network ...
Tuomas Aura, Aarthi Nagarajan, Andrei Gurtov
CSL
2007
Springer
14 years 1 months ago
Tightening the Exchange Rates Between Automata
Automata on infinite objects were the key to the solution of several fundamental decision problems in mathematics and logic. Today, automata on infinite objects are used for form...
Orna Kupferman
ICLA
2009
Springer
14 years 2 months ago
Instantial Relevance in Polyadic Inductive Logic
Abstract. We show that under the assumptions of Spectrum Exchangeability and Language Invariance the so called Only Rule, a principle of instantial relevance previously know for un...
Jürgen Landes, Jeff B. Paris, Alena Vencovsk&...