Sciweavers

1490 search results - page 109 / 298
» The Logic of Authentication Protocols
Sort
View
CTRSA
2005
Springer
154views Cryptology» more  CTRSA 2005»
14 years 2 months ago
A New Two-Party Identity-Based Authenticated Key Agreement
We present a new two-party identity-based key agreement that is more efficient than previously proposed schemes. It is inspired on a new identity-based key pair derivation algorith...
Noel McCullagh, Paulo S. L. M. Barreto
DCOSS
2006
Springer
14 years 19 days ago
Locating Compromised Sensor Nodes Through Incremental Hashing Authentication
Abstract. While sensor networks have recently emerged as a promising computing model, they are vulnerable to various node compromising attacks. In this paper, we propose COOL, a CO...
Youtao Zhang, Jun Yang 0002, Lingling Jin, Weijia ...
ESAS
2007
Springer
14 years 3 months ago
Distance Bounding in Noisy Environments
Location information can be used to enhance mutual entity authentication protocols in wireless ad-hoc networks. More specifically, distance bounding protocols have been introduced...
Dave Singelée, Bart Preneel
AAMAS
1999
Springer
13 years 8 months ago
Verifying Compliance with Commitment Protocols
Interaction protocols are specific, often standard, constraints on the behaviors of autonomous agents in a multiagent system. Protocols are essential to the functioning of open sys...
Mahadevan Venkatraman, Munindar P. Singh
JELIA
2004
Springer
14 years 2 months ago
Automatic Compilation of Protocol Insecurity Problems into Logic Programming
Alessandro Armando, Luca Compagna, Yuliya Lierler