Sciweavers

1834 search results - page 181 / 367
» Public Key Cryptography
Sort
View
IEICET
2010
105views more  IEICET 2010»
13 years 7 months ago
Between Hashed DH and Computational DH: Compact Encryption from Weaker Assumption
In this paper, we introduce the intermediate hashed Diffie-Hellman (IHDH) assumption which is weaker than the hashed DH (HDH) assumption (and thus the decisional DH assumption), a...
Goichiro Hanaoka, Kaoru Kurosawa
CORR
2011
Springer
216views Education» more  CORR 2011»
13 years 4 months ago
Approaches to Formal Verification of Security Protocols
— In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional cor...
Suvansh Lal, Mohit Jain, Vikrant Chaplot
GRID
2006
Springer
13 years 9 months ago
Streamlining Grid Operations: Definition and Deployment of a Portal-based User Registration Service
Manual management of public key credentials can be a significant and often off-putting obstacle to Grid use, particularly for casual users. We describe the Portal-based User Regis...
Ian T. Foster, Veronika Nefedova, Mehran Ahsant, R...
GLOBECOM
2010
IEEE
13 years 7 months ago
Practical Defenses for Evil Twin Attacks in 802.11
Open-access 802.11 wireless networks are commonly deployed in cafes, bookstores, and other public spaces to provide free Internet connectivity. These networks are convenient to dep...
Harold Gonzales, Kevin S. Bauer, Janne Lindqvist, ...
IEEECIT
2010
IEEE
13 years 7 months ago
On Small Subgroup Non-confinement Attack
The small subgroup confinement attack works by confining cryptographic operations within a small subgroup, in which exhaustive search is feasible. This attack is overt and hence ca...
Feng Hao