Sciweavers

1777 search results - page 63 / 356
» Programming Cryptographic Protocols
Sort
View
ACNS
2010
Springer
133views Cryptology» more  ACNS 2010»
14 years 1 days ago
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm
Abstract. We propose a new protocol providing cryptographically secure authentication to unaided humans against passive adversaries. We also propose a new generic passive attack on...
Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wan...
CANS
2008
Springer
126views Cryptology» more  CANS 2008»
13 years 10 months ago
A New Message Recognition Protocol for Ad Hoc Pervasive Networks
We propose a message recognition protocol which is suitable for ad hoc pervasive networks without the use of hash chains. Hence, we no longer require the devices to save values of ...
Atefeh Mashatan, Douglas R. Stinson
POPL
2010
ACM
14 years 6 months ago
Modular Verification of Security Protocol Code by Typing
Andrew D. Gordon, Cédric Fournet, Karthikey...
ADHOCNOW
2009
Springer
13 years 9 months ago
Secure EPC Gen2 Compliant Radio Frequency Identification
The increased functionality of EPC Class1 Gen2 (EPCGen2) is making this standard a de facto specification for inexpensive tags in the RFID industry. Recently three EPCGen2 complian...
Mike Burmester, Breno de Medeiros, Jorge Munilla, ...
GLOBECOM
2008
IEEE
13 years 8 months ago
An Efficient Group Key Management for Secure Routing in Ad Hoc Networks
This paper proposes and specifies a protocol for distributing and managing group keys in ad hoc environments, which applies for the Secure Optimized Link State Routing Protocol. Ou...
Natalia Castro Fernandes, Otto Carlos Muniz Bandei...