Sciweavers

1490 search results - page 111 / 298
» The Logic of Authentication Protocols
Sort
View
105
Voted
JCIT
2010
151views more  JCIT 2010»
14 years 10 months ago
A Flexible Resource Location Protocol for Peer-to-Peer Network
An important and fundamental issue in designing structured peer-to-peer networks is the tradeoff between the number of logical links and the number of hops. We present a flexible ...
Xu Xiang
199
Voted
TMC
2012
13 years 6 months ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright
148
Voted
ASIACRYPT
2001
Springer
15 years 7 months ago
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank
A Zero-knowledge protocol provides provably secure entity authentication based on a hard computational problem. Among many schemes proposed since 1984, the most practical rely on f...
Nicolas Courtois
135
Voted
CCS
2009
ACM
16 years 4 months ago
Authenticated wireless roaming via tunnels: making mobile guests feel at home
In wireless roaming a mobile device obtains a service from some foreign network while being registered for the similar service at its own home network. However, recent proposals tr...
Mark Manulis, Damien Leroy, François Koeune...
134
Voted
ICDCN
2010
Springer
15 years 10 months ago
Authenticated Byzantine Generals in Dual Failure Model
Pease et al. introduced the problem of Byzantine Generals (BGP) to study the effects of Byzantine faults in distributed protocols for reliable broadcast. It is well known that BG...
Anuj Gupta, Prasant Gopal, Piyush Bansal, Kannan S...