Sciweavers

1653 search results - page 113 / 331
» Timed analysis of security protocols
Sort
View
112
Voted
ASIACRYPT
1999
Springer
15 years 7 months ago
How to Prove That a Committed Number Is Prime
Abstract. The problem of proving a number is of a given arithmetic format with some prime elements, is raised in RSA undeniable signature, group signature and many other cryptograp...
Tri Van Le, Khanh Quoc Nguyen, Vijay Varadharajan
126
Voted
ICDCSW
2003
IEEE
15 years 8 months ago
LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...
127
Voted
TC
2008
15 years 2 months ago
Elliptic-Curve-Based Security Processor for RFID
RFID (Radio Frequency IDentification) tags need to include security functions, yet at the same time their resources are extremely limited. Moreover, to provide privacy, authenticat...
Yong Ki Lee, Kazuo Sakiyama, Lejla Batina, Ingrid ...
102
Voted
ESORICS
2009
Springer
16 years 3 months ago
Authentic Time-Stamps for Archival Storage
Abstract. We study the problem of authenticating the content and creation time of documents generated by an organization and retained in archival storage. Recent regulations (e.g.,...
Alina Oprea, Kevin D. Bowers
136
Voted
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
15 years 6 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...