Sciweavers

632 search results - page 16 / 127
» Two Facets of Authentication
Sort
View
ESORICS
2009
Springer
14 years 10 months ago
Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries
Authenticated dictionaries allow users to send lookup requests to an untrusted server and get authenticated answers. Persistent authenticated dictionaries (PADs) add queries agains...
Scott A. Crosby, Dan S. Wallach
CIS
2007
Springer
14 years 3 months ago
A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-Key Cryptography
The session initiation protocol (SIP) is considered as the dominant signaling protocol for calls over the internet. However, SIP authentication typically uses HTTP digest authentic...
Fengjiao Wang, Yuqing Zhang
SPW
2004
Springer
14 years 3 months ago
Authentication Components: Engineering Experiences and Guidelines
abstract February 6, 2004 Security protocols typically employ an authentication phase followed by a protected data exchange. In some cases, such TLS, these two phases are tightly ...
Pasi Eronen, Jari Arkko
CAISE
2003
Springer
14 years 2 months ago
A study of Object Evolution
we propose a repository to characterize OO evolution problematic. The two main objectives are to characterize object evolution according to its own features, and to uniformly analy...
Mourad Oussalah, Dalila Tamzalit
CANS
2009
Springer
126views Cryptology» more  CANS 2009»
14 years 4 months ago
Ensuring Authentication of Digital Information Using Cryptographic Accumulators
In this paper, we study the broadcast authentication problem for both erasure and adversarial networks. Two important concerns for authentication protocols are the authentication ...
Christophe Tartary