Sciweavers

632 search results - page 22 / 127
» Two Facets of Authentication
Sort
View
SIGMOD
2009
ACM
157views Database» more  SIGMOD 2009»
14 years 10 months ago
Authenticated join processing in outsourced databases
Database outsourcing requires that a query server constructs a proof of result correctness, which can be verified by the client using the data owner's signature. Previous aut...
Yin Yang, Dimitris Papadias, Stavros Papadopoulos,...
AFRICACRYPT
2009
Springer
14 years 4 months ago
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps
We propose a generic modelling technique that can be used to extend existing frameworks for theoretical security analysis in order to capture the use of timestamps. We apply this t...
Manuel Barbosa, Pooya Farshim
INFORMATICALT
2008
105views more  INFORMATICALT 2008»
13 years 9 months ago
Public Key Authentication Schemes for Local Area Networks
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang
WINET
2010
137views more  WINET 2010»
13 years 4 months ago
The design and evaluation of interleaved authentication for filtering false reports in multipath routing WSNs
In this paper, we consider filtering false reports in braided multipath routing sensor networks. While multipath routing provides better resilience to various faults in sensor net...
Youtao Zhang, Jun Yang 0002, Hai T. Vu, Yizhi Wu
CSFW
2005
IEEE
14 years 3 months ago
Analysis of Typed Analyses of Authentication Protocols
This paper contrasts two existing type-based techniques for the analysis of authentication protocols. The former, proposed by Gordon and Jeffrey, uses dependent types for nonces a...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei