Sciweavers

4111 search results - page 199 / 823
» Security, Protocols, and Trust
Sort
View
SAC
2009
ACM
14 years 5 months ago
On the practical importance of communication complexity for secure multi-party computation protocols
Many advancements in the area of Secure Multi-Party Computation (SMC) protocols use improvements in communication complexity as a justification. We conducted an experimental stud...
Florian Kerschbaum, Daniel Dahlmeier, Axel Schr&ou...
DEXAW
2009
IEEE
124views Database» more  DEXAW 2009»
14 years 5 months ago
Performance Comparison of Secure Comparison Protocols
Secure Multiparty Computation (SMC) has gained tremendous importance with the growth of the Internet and E-commerce, where mutually untrusted parties need to jointly compute a fun...
Florian Kerschbaum, Debmalya Biswas, Sebastiaan de...
CCS
2008
ACM
14 years 22 days ago
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks
Multi-hop routing is essential to the operation of wireless ad hoc networks. Unfortunately, it is very easy for an adversary to forge or modify routing messages to inflict severe ...
Qing Li, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig,...
IADIS
2003
14 years 3 days ago
Enhance Opensst Protocol's Security with Smart Card
As an open source project, Open Simple Secure Transaction (OpenSST) protocol aims to be a secure and transactionoriented protocol for the unsecured network. At present a prototype...
Xinhua Zhang, Alexandre Dulaunoy, Christoph Meinel
NDSS
2000
IEEE
14 years 3 months ago
A First Step Towards the Automatic Generation of Security Protocols
This paper describes automatic protocol generation (APG for short), a novel mechanism to generate security protocols automatically. With APG, the protocol designer inputs the spec...
Adrian Perrig, Dawn Xiaodong Song