Sciweavers

4111 search results - page 209 / 823
» Security, Protocols, and Trust
Sort
View
ATAL
2005
Springer
15 years 6 months ago
Trusted kernel-based coalition formation
We define Trusted Kernel-based Coalition Formation as a novel extension to the traditional kernel-based coalition formation process which ensures agents choose the most reliable ...
Bastian Blankenburg, Rajdeep K. Dash, Sarvapali D....
114
Voted
ISW
2007
Springer
15 years 7 months ago
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension
Abstract. We study the provable security of identity-based (ID-based) key agreement protocols. Although several published protocols have been proven secure in the random oracle mod...
Sherman S. M. Chow, Kim-Kwang Raymond Choo
TCC
2007
Springer
116views Cryptology» more  TCC 2007»
15 years 7 months ago
Long-Term Security and Universal Composability
Abstract. Algorithmic progress and future technology threaten today’s cryptographic protocols. Long-term secure protocols should not even in future reveal more information to a...
Jörn Müller-Quade, Dominique Unruh
WECWIS
2002
IEEE
106views ECommerce» more  WECWIS 2002»
15 years 5 months ago
I-DG: A Secure Protocol for Disseminating Data to Subscribers via IP Multicast
This paper proposes the IP Multicast-enabled Drop Groups (I-DG) protocol as a solution to the problem of efficiently and securely disseminating information to a large number of s...
Aslihan Celik, JoAnne Holliday, Bindumadhavi Ramav...
IJNSEC
2006
75views more  IJNSEC 2006»
15 years 1 months ago
Cryptanalysis of the Secure Sessions from Weak Secrets Protocols
The Short Secret Sharing Protocols (S3P), proposed by Roe et al in 1998 [13] and revised in 2003 [14], is a family of protocols that bootstrap secure session keys from weak secret...
Jolyon Clulow