Sciweavers

849 search results - page 18 / 170
» Secure Applications of Low-Entropy Keys
Sort
View
COMCOM
2008
62views more  COMCOM 2008»
13 years 7 months ago
Secure multi-mode systems and their applications for pervasive computing
Submissions should include an abstract, 5-10 key words, and the e
Jong Hyuk Park, Hsiao-Hwa Chen, Antonio Coronato, ...
ACISP
2004
Springer
14 years 29 days ago
Protocols with Security Proofs for Mobile Applications
The Canetti-Krawczyk (CK) model is useful for building reusable components that lead to rapid development of secure protocols, especially for engineers working outside of the secur...
Yiu Shing Terry Tin, Harikrishna Vasanta, Colin Bo...
PKC
2000
Springer
84views Cryptology» more  PKC 2000»
13 years 11 months ago
Forward Secrecy and Its Application to Future Mobile Communications Security
Abstract. Perfect forward secrecy, one of the possible security features provided by key establishment protocols, concerns dependency of a session key upon long-term secret keys (s...
DongGook Park, Colin Boyd, Sang-Jae Moon
CDC
2010
IEEE
137views Control Systems» more  CDC 2010»
13 years 2 months ago
Left invertibility of output-quantized systems: An application to cryptography
ABSTRACT. In this paper a secure communication method is proposed, based on left invertibility of output-quantized dynamical systems. The sender uses an output-quantized linear sys...
Nevio Dubbini, Anna Carluccio, Antonio Bicchi
IACR
2011
129views more  IACR 2011»
12 years 7 months ago
Bounded Vector Signatures and their Applications
Although malleability is undesirable in traditional digital signatures, schemes with limited malleability properties enable interesting functionalities that may be impossible to o...
Lei Wei, Scott E. Coull, Michael K. Reiter