Sciweavers

54 search results - page 3 / 11
» ieeeares 2007
Sort
View
IEEEARES
2007
IEEE
14 years 2 months ago
Attacks are Protocols Too
In this paper we show how to simulate attacks on authentication protocols in a realistic environment. The attack on the Needham-Schroeder public key protocol found by Gavin Lowe i...
Anders Moen Hagalisletto
IEEEARES
2007
IEEE
14 years 2 months ago
Secure Distributed Dossier Management in the Legal Domain
The use of digital dossiers in Courts of Law, although currently in the phase of study, will be common practice in the future. This paper introduces the notion of distributed digi...
Martijn Warnier, Frances M. T. Brazier, Martin Api...
IEEEARES
2007
IEEE
14 years 2 months ago
Revisiting Hot Passive Replication
Passive replication has been extensively studied in the literature. However, there is no comprehensive study yet with regard to its degree of communication synchrony. Therefore, w...
Rubén de Juan-Marín, Hendrik Decker,...
IEEEARES
2007
IEEE
14 years 2 months ago
Agent Alliances: A Means for Practical Threshold Signature
In [7] we have proposed a model for the robust and private evaluation of a function within a group of cooperating mobile agents, called an agent Alliance. The model has been given...
Regine Endsuleit, Christoph Amma
IEEEARES
2007
IEEE
14 years 2 months ago
Broadcast Authentication Protocol with Time Synchronization and Quadratic Residues Chain
Assuring information authenticity is an important issue in the field of information security. A new broadcast authentication protocol is proposed. The protocol is based on time sy...
Bogdan Groza