Sciweavers

403 search results - page 69 / 81
» Secure Protocols with Asymmetric Trust
Sort
View
WISEC
2010
ACM
14 years 3 months ago
On the reliability of wireless fingerprinting using clock skews
Determining whether a client station should trust an access point is a known problem in wireless security. Traditional approaches to solving this problem resort to cryptography. B...
Chrisil Arackaparambil, Sergey Bratus, Anna Shubin...
KESAMSTA
2007
Springer
14 years 2 months ago
Non-repudiation Mechanism of Agent-Based Mobile Payment Systems: Perspectives on Wireless PKI
: Non-repudiation of a mobile payment transaction ensures that when a buyer (B) sends some messages to a seller (S), neither B nor S can deny having participated in this transactio...
Chung-Ming Ou, Chung-Ren Ou
CCS
2001
ACM
14 years 28 days ago
A Cryptanalysis of the High-Bandwidth Digital Content Protection System
Abstract. We describe a weakness in the High Bandwidth Digital Content Protection (HDCP) scheme which may lead to practical attacks. HDCP is a proposed identity-based cryptosystem ...
Scott Crosby, Ian Goldberg, Robert Johnson, Dawn X...
CORR
2006
Springer
169views Education» more  CORR 2006»
13 years 8 months ago
Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model
We consider a type of zero-knowledge protocols that are of interest for their practical applications within networks like the Internet: efficient zero-knowledge arguments of knowl...
Yi Deng, Giovanni Di Crescenzo, Dongdai Lin
INFOCOM
1998
IEEE
14 years 20 days ago
Compact and Unforgeable Key Establishment over an ATM Network
Authenticated session key establishment is a central issue in network security. This paper addresses a question on whether we can design a compact, efficient and authenticated key ...
Yuliang Zheng, Hideki Imai