Sciweavers

894 search results - page 14 / 179
» Secure Implementation of Channel Abstractions
Sort
View
CRYPTO
2005
Springer
113views Cryptology» more  CRYPTO 2005»
14 years 1 months ago
Secure Communications over Insecure Channels Based on Short Authenticated Strings
Abstract. We propose a way to establish peer-to-peer authenticated communications over an insecure channel by using an extra channel which can authenticate very short strings, e.g....
Serge Vaudenay
ESORICS
2009
Springer
14 years 2 months ago
Hide and Seek in Time - Robust Covert Timing Channels
Abstract. Covert timing channels aim at transmitting hidden messages by controlling the time between transmissions of consecutive payload packets in overt network communication. Pr...
Yali Liu, Dipak Ghosal, Frederik Armknecht, Ahmad-...
SPW
1997
Springer
13 years 11 months ago
Protocols Using Anonymous Connections: Mobile Applications
This paper describes security protocols that use anonymous channels as primitive, much in the way that key distribution protocols ryption as primitive. This abstraction allows us t...
Michael G. Reed, Paul F. Syverson, David M. Goldsc...
ACNS
2010
Springer
132views Cryptology» more  ACNS 2010»
13 years 11 months ago
Efficient Implementation of the Orlandi Protocol
Abstract. We present an efficient implementation of the Orlandi protocol which is the first implementation of a protocol for multiparty computation on arithmetic circuits, which is...
Thomas P. Jakobsen, Marc X. Makkes, Janus Dam Niel...
ISCAS
2005
IEEE
131views Hardware» more  ISCAS 2005»
14 years 1 months ago
Digitizing of UWB signals based on frequency channelization
Abstract - One of the primary challenges in the implementation of the UWB radio is the design of the analog-todigital converter (ADC). To relax the ADC requirements, the frequency ...
Won Namgoong, Lei Feng