Sciweavers

57 search results - page 7 / 12
» Solutions to the GSM Security Weaknesses
Sort
View
IACR
2011
97views more  IACR 2011»
12 years 7 months ago
Two-Output Secure Computation with Malicious Adversaries
We present a method to compile Yao’s two-player garbled circuit protocol into one that is secure against malicious adversaries that relies on witness indistinguishability. Our ap...
Abhi Shelat, Chih-Hao Shen
ICSNC
2007
IEEE
14 years 1 months ago
Using the mobile phone as a security token for unified authentication
- The number of different identities and credentials used for authentication towards services on the Internet has increased beyond the manageable. Still, the most common authentica...
Steffen Hallsteinsen, Ivar Jørstad, Do Van ...
TCOS
2010
13 years 2 months ago
J-PAKE: Authenticated Key Exchange without PKI
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication be...
Feng Hao, Peter Ryan
MOC
2010
13 years 2 months ago
Convergent finite element discretization of the multi-fluid nonstationary incompressible magnetohydrodynamics equations
Abstract. We propose a convergent implicit stabilized finite element discretization of the nonstationary incompressible magnetohydrodynamics equations with variable density, viscos...
Lubomír Bañas, Andreas Prohl
NSPW
2004
ACM
14 years 28 days ago
Support for multi-level security policies in DRM architectures
Digital rights management systems allow copyrighted content to be commercialized in digital format without the risk of revenue loss due to piracy. Making such systems secure is no...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...