Sciweavers

1190 search results - page 73 / 238
» Secure off-the-record messaging
Sort
View
AGENTS
2000
Springer
15 years 9 months ago
Verbal communication: using approximate sound propagation to design an inter-agents communication language
In this paper, we will present a method for generating conversations between human-like agents by proposing specific parameters for inter-agents messages with an approximation of...
Jean-Sébastien Monzani, Daniel Thalmann
JUCS
2008
149views more  JUCS 2008»
15 years 4 months ago
Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension
: In a secure roaming scenario, a user U travels to a foreign network and communicates with a foreign server V securely so that no one other than U and V can obtain the messages ex...
Guomin Yang, Duncan S. Wong, Xiaotie Deng
152
Voted
EUROCRYPT
2008
Springer
15 years 6 months ago
Almost-Everywhere Secure Computation
Secure multi-party computation (MPC) is a central problem in cryptography. Unfortunately, it is well known that MPC is possible if and only if the underlying communication network...
Juan A. Garay, Rafail Ostrovsky
WS
2003
ACM
15 years 10 months ago
Secure data transmission in mobile ad hoc networks
The vision of nomadic computing with its ubiquitous access has stimulated much interest in the Mobile Ad Hoc Networking (MANET) technology. However, its proliferation strongly dep...
Panagiotis Papadimitratos, Zygmunt J. Haas
IJNSEC
2011
128views more  IJNSEC 2011»
14 years 11 months ago
Certificateless Group Oriented Signature Secure Against Key Replacement Attack
Since Al-Riyami and Paterson presented certificateless cryptography, many certificateless schemes have been proposed for different purposes. In this paper, we present a certificate...
Chunbo Ma, Jun Ao