Sciweavers

1777 search results - page 76 / 356
» Programming Cryptographic Protocols
Sort
View
TKDE
2010
272views more  TKDE 2010»
13 years 7 months ago
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Prashant Dewan, Partha Dasgupta
PODC
2011
ACM
12 years 11 months ago
Securing social networks
We present a cryptographic framework to achieve access control, privacy of social relations, secrecy of resources, and anonymity of users in social networks. The main idea is to u...
Michael Backes, Matteo Maffei, Kim Pecina
ICES
2003
Springer
79views Hardware» more  ICES 2003»
14 years 1 months ago
Using Genetic Programming to Generate Protocol Adaptors for Interprocess Communication
Abstract. As mobile devices become more powerful, interprocess communication becomes increasingly more important. Unfortunately, this larger freedom of mobility gives rise to unkno...
Werner Van Belle, Tom Mens, Theo D'Hondt
ESORICS
2006
Springer
14 years 13 days ago
Conditional Reactive Simulatability
Abstract. Simulatability has established itself as a salient notion for defining and proving the security of cryptographic protocols since it entails strong security and compositio...
Michael Backes, Markus Dürmuth, Dennis Hofhei...
ADT
2010
13 years 8 months ago
Fair data collection in wireless sensor networks: analysis and protocol
Md. Abdul Hamid, Muhammad Mahbub Alam, Md. Sharifu...