Sciweavers

1656 search results - page 179 / 332
» Secure Computation Without Authentication
Sort
View
ICCSA
2005
Springer
14 years 3 months ago
Security Flaws in Several Group Signatures Proposed by Popescu
In resent years, Popescu proposed several group signature schemes based on the Okamoto-Shiraishi assumption in [8–11], and claimed his schemes are secure. However, this paper dem...
Guilin Wang, Sihan Qing
ICC
2009
IEEE
132views Communications» more  ICC 2009»
14 years 5 months ago
A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity
—A key agreement protocol is a protocol whereby two or more communicating parties can agree on a key or exchange information over an open communication network in such a way that...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang
ACNS
2009
Springer
143views Cryptology» more  ACNS 2009»
14 years 4 months ago
A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks
Abstract. We examine the problem of message recognition by reviewing the definitions and the security model in the literature. In particular, we examine the Jane Doe protocol, whi...
Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson
ISI
2007
Springer
14 years 4 months ago
Using Digital Chains of Custody on Constrained Devices to Verify Evidence
—A digital chain of custody is an account documenting digital data at a particular place and time. This paper gives a method of validating and authenticating a digital chain of c...
Phillip G. Bradford, Daniel A. Ray
CCS
2005
ACM
14 years 3 months ago
Countering DoS attacks with stateless multipath overlays
Indirection-based overlay networks (IONs) are a promising approach for countering distributed denial of service (DDoS) attacks. Such mechanisms are based on the assumption that at...
Angelos Stavrou, Angelos D. Keromytis