Sciweavers

609 search results - page 48 / 122
» One-Time-Password-Authenticated Key Exchange
Sort
View
SCL
2011
13 years 4 months ago
Suboptimal decentralized control over noisy communication channels
In this paper we present a technique for design of decentralized controllers for mean square stability of a large scale system with cascaded clusters of subsystems. Each subsystem...
Alireza Farhadi, N. U. Ahmed
IACR
2011
255views more  IACR 2011»
12 years 9 months ago
A Standard-Model Security Analysis of TLS-DHE
TLS is the most important cryptographic protocol in use today. However, up to now there is no complete cryptographic security proof in the standard model, nor in any other model. ...
Tibor Jager, Florian Kohlar, Sven Schäge, J&o...
CSFW
2012
IEEE
12 years 4 days ago
Provably Secure and Practical Onion Routing
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory...
Michael Backes, Ian Goldberg, Aniket Kate, Esfandi...
ASIACRYPT
2003
Springer
14 years 1 months ago
Certificateless Public Key Cryptography
This paper introduces the concept of certificateless public key cryptography (CL-PKC). In contrast to traditional public key cryptographic systems, CL-PKC does not require the use...
Sattam S. Al-Riyami, Kenneth G. Paterson
HOST
2009
IEEE
14 years 4 months ago
Secure IP-Block Distribution for Hardware Devices
—EDA vendors have proposed a standard for the sharing of IP among vendors to be used in the design and development of IP for FPGAs. Although, we do not propose any attacks, we sh...
Jorge Guajardo, Tim Güneysu, Sandeep S. Kumar...