Sciweavers

4111 search results - page 209 / 823
» Security, Protocols, and Trust
Sort
View
ATAL
2005
Springer
14 years 4 months ago
Trusted kernel-based coalition formation
We define Trusted Kernel-based Coalition Formation as a novel extension to the traditional kernel-based coalition formation process which ensures agents choose the most reliable ...
Bastian Blankenburg, Rajdeep K. Dash, Sarvapali D....
ISW
2007
Springer
14 years 4 months ago
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension
Abstract. We study the provable security of identity-based (ID-based) key agreement protocols. Although several published protocols have been proven secure in the random oracle mod...
Sherman S. M. Chow, Kim-Kwang Raymond Choo
TCC
2007
Springer
116views Cryptology» more  TCC 2007»
14 years 4 months ago
Long-Term Security and Universal Composability
Abstract. Algorithmic progress and future technology threaten today’s cryptographic protocols. Long-term secure protocols should not even in future reveal more information to a...
Jörn Müller-Quade, Dominique Unruh
WECWIS
2002
IEEE
106views ECommerce» more  WECWIS 2002»
14 years 3 months ago
I-DG: A Secure Protocol for Disseminating Data to Subscribers via IP Multicast
This paper proposes the IP Multicast-enabled Drop Groups (I-DG) protocol as a solution to the problem of efficiently and securely disseminating information to a large number of s...
Aslihan Celik, JoAnne Holliday, Bindumadhavi Ramav...
IJNSEC
2006
75views more  IJNSEC 2006»
13 years 10 months ago
Cryptanalysis of the Secure Sessions from Weak Secrets Protocols
The Short Secret Sharing Protocols (S3P), proposed by Roe et al in 1998 [13] and revised in 2003 [14], is a family of protocols that bootstrap secure session keys from weak secret...
Jolyon Clulow