Sciweavers

241 search results - page 19 / 49
» Quantum Authenticated Key Distribution
Sort
View
CONCUR
2005
Springer
14 years 1 months ago
Timed Spi-Calculus with Types for Secrecy and Authenticity
Abstract. We present a discretely timed spi-calculus. A primitive for key compromise allows us to model key compromise attacks, thus going beyond the standard Dolev–Yao attacker ...
Christian Haack, Alan Jeffrey
CORR
2010
Springer
152views Education» more  CORR 2010»
13 years 5 months ago
A new key establishment scheme for wireless sensor networks
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the se...
Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu
EUROPAR
2005
Springer
14 years 1 months ago
On AAA Based on Brokers and Pre-encrypted Keys in MIPv6
For providing mobility services for users through the global Internet, Mobile IP (MIP) has been standardized by IETF. Since conventional MIP has been investigated without the suppo...
Hoseong Jeon, Min Young Chung, Hyunseung Choo
SRDS
1993
IEEE
13 years 11 months ago
Some Remarks on Protecting Weak Keys and Poorly-Chosen Secrets from Guessing Attacks
Authentication and key distribution protocols that utilize weak secrets (such as passwords and PINs) are traditionally susceptible to guessing attacks whereby an adversary iterate...
Gene Tsudik, Els Van Herreweghen
ISHPC
1999
Springer
13 years 11 months ago
Integrity and Performance in Network Attached Storage
Computer security is of growing importance in the increasingly networked computing environment.This work examines the issue of high-performance network security, specifically int...
Howard Gobioff, David Nagle, Garth A. Gibson