Sciweavers

256 search results - page 35 / 52
» Reusing Static Keys in Key Agreement Protocols
Sort
View
ESCIENCE
2005
IEEE
14 years 3 months ago
Identity-Based Cryptography for Grid Security
The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to...
Hoon Wei Lim, Kenneth G. Paterson
ACNS
2006
Springer
121views Cryptology» more  ACNS 2006»
14 years 4 months ago
Authentication for Paranoids: Multi-party Secret Handshakes
In a society increasingly concerned with the steady assault on electronic privacy, the need for privacy-preserving techniques is both natural and justified. This need extends to t...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
IANDC
2007
126views more  IANDC 2007»
13 years 10 months ago
Alternating two-way AC-tree automata
We explore the notion of alternating two-way tree automata modulo the theory of finitely many associative-commutative (AC) symbols. This was prompted by questions arising in cryp...
Kumar Neeraj Verma, Jean Goubault-Larrecq
MOBIQUITOUS
2007
IEEE
14 years 4 months ago
High Performance AODV Routing Protocol for Hybrid Wireless Mesh Networks
– Hybrid Wireless Mesh Networks are wireless multi-hop networks consisting of two types of nodes, Mesh Routers and Mesh Clients. Mesh Routers are more static and less resource co...
Asad Amir Pirzada, Marius Portmann
FSTTCS
2004
Springer
14 years 3 months ago
Adaptive Stabilization of Reactive Protocols
A self-stabilizing distributed protocol can recover from any state-corrupting fault. A self-stabilizing protocol is called adaptive if its recovery time is proportional to the numb...
Shay Kutten, Boaz Patt-Shamir