Sciweavers

4111 search results - page 95 / 823
» Security, Protocols, and Trust
Sort
View
ISW
2001
Springer
14 years 2 months ago
An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party
Abstract. In this paper we consider a new and efficient optimistic nonrepudiation protocol. In a non-repudiation protocol, during which Alice wants to transmit a message to Bob, Al...
Olivier Markowitch, Steve Kremer
IWCMC
2006
ACM
14 years 4 months ago
Modeling key agreement in multi-hop ad hoc networks
Securing multicast communications in ad hoc networks has become one of the most challenging research directions in the areas of wireless networking and security. This is especiall...
Giovanni Di Crescenzo, Maria Striki, John S. Baras
PEWASUN
2004
ACM
14 years 3 months ago
A novel solution for achieving anonymity in wireless ad hoc networks
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a wireless and mobile ad hoc network usually seek the help of ...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
ICALP
2003
Springer
14 years 3 months ago
Secrecy in Untrusted Networks
We investigate the protection of migrating agents against the untrusted sites they traverse. The resulting calculus provides a formal framework to reason about protection policies ...
Michele Bugliesi, Silvia Crafa, Amela Prelic, Vlad...
DAGSTUHL
2007
13 years 11 months ago
CodeVoting: protecting against malicious vote manipulation at the voter's PC
Voting in uncontrolled environments, such as the Internet comes with a price, the price of having to trust in uncontrolled machines the collection of voter’s vote. An uncontrolle...
Rui Joaquim, Carlos Ribeiro