Sciweavers

9 search results - page 1 / 2
» Secret Handshakes with Revocation Support
Sort
View
ICISC
2009
120views Cryptology» more  ICISC 2009»
13 years 9 months ago
Secret Handshakes with Revocation Support
Alessandro Sorniotti, Refik Molva
NDSS
2007
IEEE
14 years 5 months ago
Secret Handshakes with Dynamic and Fuzzy Matching
The need for communication privacy over public networks is of growing concern in today’s society. As a result, privacy-preserving authentication and key exchange protocols have ...
Giuseppe Ateniese, Jonathan Kirsch, Marina Blanton
SP
2003
IEEE
136views Security Privacy» more  SP 2003»
14 years 4 months ago
Secret Handshakes from Pairing-Based Key Agreements
Consider a CIA agent who wants to authenticate herself to a server, but does not want to reveal her CIA credentials unless the server is a genuine CIA outlet. Consider also that t...
Dirk Balfanz, Glenn Durfee, Narendar Shankar, Dian...
ACNS
2011
Springer
237views Cryptology» more  ACNS 2011»
13 years 2 months ago
Private Discovery of Common Social Contacts
The increasing use of computing devices for social interactions propels the proliferation of online social applications, yet, it prompts a number of privacy concerns. One common p...
Emiliano De Cristofaro, Mark Manulis, Bertram Poet...
CCS
2007
ACM
14 years 5 months ago
Hardware-rooted trust for secure key management and transient trust
We propose minimalist new hardware additions to a microprocessor chip that protect cryptographic keys in portable computing devices which are used in the field but owned by a cen...
Jeffrey S. Dwoskin, Ruby B. Lee