Sciweavers

1116 search results - page 118 / 224
» Secure Mediation: Requirements and Design
Sort
View
IWCMC
2009
ACM
14 years 4 months ago
Dynamic trust establishment in emergency ad hoc networks
This paper proposes a dynamic trust establishment protocol that enables the nodes of an ad hoc network to establish security associations among each other in a distributed and pee...
Christos A. Papageorgiou, Konstantinos Birkos, Tas...
FC
2007
Springer
141views Cryptology» more  FC 2007»
14 years 3 months ago
WSKE: Web Server Key Enabled Cookies
In this paper, we present the design and prototype of a new approach to cookie management: if a server deposits a cookie only after authenticating itself via the SSL handshake, the...
Chris Masone, Kwang-Hyun Baek, Sean W. Smith
FSE
2007
Springer
123views Cryptology» more  FSE 2007»
14 years 3 months ago
The Grindahl Hash Functions
In this paper we propose the Grindahl hash functions, which are based on components of the Rijndael algorithm. To make collision search sufficiently difficult, this design has the...
Lars R. Knudsen, Christian Rechberger, Søre...
IPCCC
2005
IEEE
14 years 3 months ago
Source routing based pairwise key establishment protocol for sensor networks
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. The establishment...
D. Huang, M. Mehta, D. Medhi
ICIAR
2010
Springer
14 years 2 months ago
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-factor authentication has been introduced in order to enhance security in authentication systems. Different factors have been introduced, which are combined for means of contr...
Christian Rathgeb, Andreas Uhl