Sciweavers

686 search results - page 82 / 138
» Secure Two-Party Computation Is Practical
Sort
View
134
Voted
CCS
2008
ACM
15 years 4 months ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
154
Voted
IJNSEC
2011
272views more  IJNSEC 2011»
14 years 9 months ago
Trust Key Management Scheme for Wireless Body Area Networks
With recent advances in wireless sensor networks and embedded computing technologies, miniaturized pervasive health monitoring devices have become practically feasible. In additio...
Mohammed Mana, Mohammed Feham, Boucif Amar Bensabe...
102
Voted
IACR
2011
120views more  IACR 2011»
14 years 2 months ago
McOE: A Foolproof On-Line Authenticated Encryption Scheme
On-Line Authenticated Encryption (OAE) combines confidentiality with data integrity and is on-line computable. Most block cipher-based schemes for Authenticated Encryption can be ...
Ewan Fleischmann, Christian Forler, Stefan Lucks
127
Voted
ESOP
2008
Springer
15 years 4 months ago
A Formal Implementation of Value Commitment
In an optimistic approach to security, one can often simplify protocol design by relying on audit logs, which can be analyzed a posteriori. Such auditing is widely used in practice...
Cédric Fournet, Nataliya Guts, Francesco Za...
191
Voted
ISSA
2008
15 years 4 months ago
Towards a Framework for a Network Warfare Capability
Information warfare has surfaced as an emerging concept that affects not only military institutions but ordinary organisations as well. Information warfare in itself consists of v...
Namosha Veerasamy, Jan H. P. Eloff