Sciweavers

1653 search results - page 202 / 331
» Timed analysis of security protocols
Sort
View
ASIACRYPT
2011
Springer
12 years 10 months ago
Resettable Cryptography in Constant Rounds - The Case of Zero Knowledge
A fundamental question in cryptography deals with understanding the role that randomness plays in cryptographic protocols and to what extent it is necessary. One particular line o...
Yi Deng, Dengguo Feng, Vipul Goyal, Dongdai Lin, A...
ISW
2010
Springer
13 years 8 months ago
An Analysis of DepenDNS
Recently, a new scheme to protect clients against DNS cache poisoning attacks was introduced. The scheme is referred to as DepenDNS and is intended to protect clients against such ...
Nadhem J. AlFardan, Kenneth G. Paterson
ESAS
2004
Springer
14 years 1 months ago
Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks
Abstract. The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node ma...
Frank Kargl, Andreas Klenk, Stefan Schlott, Michae...
EEE
2005
IEEE
14 years 3 months ago
Who Counts Your Votes?
Open and fair elections are paramount to modern democracy. Although some people claim that the penciland-paper systems used in countries such as Canada and UK are still the best m...
Halina Kaminski, Lila Kari, Mark Perry
EUROPKI
2005
Springer
14 years 3 months ago
Recoverable and Untraceable E-Cash
In an electronic cash (e-cash) system, Recoverability means once you have lost your e-cash, you still can get back the amount of e-cash that you have lost. Untraceability means no ...
Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong