Sciweavers

4111 search results - page 137 / 823
» Security, Protocols, and Trust
Sort
View
ISI
2006
Springer
13 years 10 months ago
Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework
Information dissemination is of vital importance in today's information-centric world. However, controlling the flow of information across multiple security domains is a probl...
Ragib Hasan, Marianne Winslett
IJNSEC
2006
96views more  IJNSEC 2006»
13 years 10 months ago
Off-line Password Guessing Attack on an Efficient Key Agreement Protocol for Secure Authentication
In 2004, Kim, Huh, Hwang and Lee proposed an efficient key agreement protocol for secure authentication. In this paper, we shall show that their proposed protocol cannot resist th...
Rongxing Lu, Zhenfu Cao
TCC
2009
Springer
133views Cryptology» more  TCC 2009»
14 years 10 months ago
Composing Quantum Protocols in a Classical Environment
We propose a general security definition for cryptographic quantum protocols that implement classical non-reactive two-party tasks. The definition is expressed in terms of simple q...
Serge Fehr, Christian Schaffner
CCS
2006
ACM
14 years 2 months ago
Modelling the relative strength of security protocols
In this paper, we present a way to think about the relative strength of security protocols using SoS, a lattice-theoretic representation of security strength. In particular, we di...
Ho Chung, Clifford Neuman
IC
2001
13 years 11 months ago
Trust-Based Facilitator for Agent-Based E-Commerce
- In this paper, we propose a facilitator which finds capable and trustworthy partners on behalf of client users, which helps users form and maintain e-partnerships for electronic ...
Chihiro Ono, Dai Kanemoto, Keesoo Kim, Boyd C. Pau...