Sciweavers

14850 search results - page 154 / 2970
» The Security of
Sort
View
ISSE
2006
13 years 10 months ago
Security Analysis and Configuration of Large Networks
Providing and managing security for large networked systems is difficult because their size and complexity makes manual design and management nearly impossible. Current security m...
Antonio Lioy
IEEESP
2011
13 years 1 months ago
On Adversary Models and Compositional Security
We present a representative development in the science of security that includes a generic model of computer systems, their security properties and adversaries who actively interf...
Anupam Datta, Jason Franklin, Deepak Garg, Limin J...
ACISP
2005
Springer
14 years 3 months ago
Dynamic Group Key Agreement in Tree-Based Setting
We present a provably secure tree based authenticated group key agreement protocol in dynamic scenario. Bilinear pairing and multi-signature are at the heart of our protocol. We p...
Ratna Dutta, Rana Barua
ACISP
1998
Springer
14 years 2 months ago
A Solution to Open Standard of PKI
PKI Public Key Infrastructure is fundamental for many security applications on the network. However, there are so many di erent kinds of PKI at current stage and they are not comp...
Qi He, Katia P. Sycara, Zhongmin Su
STOC
2006
ACM
116views Algorithms» more  STOC 2006»
14 years 4 months ago
Information-theoretically secure protocols and security under composition
We investigate the question of whether security of protocols in the information-theoretic setting (where the adversary is computationally unbounded) implies the security of these ...
Eyal Kushilevitz, Yehuda Lindell, Tal Rabin