Sciweavers

106 search results - page 6 / 22
» Trusted Multiplexing of Cryptographic Protocols
Sort
View
SAINT
2003
IEEE
14 years 22 days ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta
FC
2009
Springer
118views Cryptology» more  FC 2009»
14 years 2 months ago
Cryptographic Combinatorial Clock-Proxy Auctions
We present a cryptographic protocol for conducting efficient, provably correct and secrecy-preserving combinatorial clock-proxy auctions. The “clock phase” functions as a trust...
David C. Parkes, Michael O. Rabin, Christopher Tho...
ISCC
2003
IEEE
140views Communications» more  ISCC 2003»
14 years 22 days ago
A Low-Energy Key Management Protocol for Wireless Sensor Networks
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...
Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kok...
SCN
2004
Springer
112views Communications» more  SCN 2004»
14 years 24 days ago
Controlling Spam by Secure Internet Content Selection
Unsolicited and undesirable e-mail (spam) is a growing problem for Internet users and service providers. We present the Secure Internet Content Selection (SICS) protocol, an effic...
Amir Herzberg
FC
2008
Springer
134views Cryptology» more  FC 2008»
13 years 9 months ago
Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents
Oblivious transfer (OT) is a fundamental primitive used in many cryptographic protocols, including general secure function evaluation (SFE) protocols. However, interaction is a pri...
Vandana Gunupudi, Stephen R. Tate