Sciweavers

CTRSA
2005
Springer
128views Cryptology» more  CTRSA 2005»
14 years 5 months ago
Simple Password-Based Encrypted Key Exchange Protocols
Michel Abdalla, David Pointcheval
CTRSA
2005
Springer
72views Cryptology» more  CTRSA 2005»
14 years 5 months ago
Proofs for Two-Server Password Authentication
Traditional password-based authentication and key-exchange protocols suffer from the simple fact that a single server stores the sensitive user password. In practice, when such a ...
Michael Szydlo, Burton S. Kaliski Jr.
CANS
2005
Springer
86views Cryptology» more  CANS 2005»
14 years 5 months ago
Distributed Credential Chain Discovery in Trust-Management with Parameterized Roles
Xian Zhu, Shaobin Wang, Fan Hong, Junguo Liao
CANS
2005
Springer
120views Cryptology» more  CANS 2005»
14 years 5 months ago
The Second-Preimage Attack on MD4
In Eurocrypt’05, Wang et al. presented new techniques to find collisions of Hash function MD4. The techniques are not only efficient to search for collisions, but also applicabl...
Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang
CANS
2005
Springer
105views Cryptology» more  CANS 2005»
14 years 5 months ago
A Novel Method to Maintain Privacy in Mobile Agent Applications
Abstract. Two methods to implement privacy in network communication, anonymity and DCSC (data confidentiality and secure computation) are analysed and compared in regard to privac...
Kun Peng, Ed Dawson, Juanma González Nieto,...
CANS
2005
Springer
134views Cryptology» more  CANS 2005»
14 years 5 months ago
A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time
Abstract. In this paper, we propose a new unsupervised anomaly detection framework for detecting network intrusions online. The framework consists of new anomalousness metrics name...
Wei Lu, Issa Traoré
CANS
2005
Springer
120views Cryptology» more  CANS 2005»
14 years 5 months ago
A New Model for Dynamic Intrusion Detection
Building on the concepts and the formal definitions of self, nonself, antigen, and detector introduced in the research of network intrusion detection, the dynamic evolution models...
Tao Li, XiaoJie Liu, Hongbin Li
CANS
2005
Springer
86views Cryptology» more  CANS 2005»
14 years 5 months ago
On the Performance and Analysis of DNS Security Extensions
The Domain Name System (DNS) is an essential component of the critical infrastructure of the Internet. The role of DNS is vital, as it is involved in virtually every Internet tran...
Reza Curtmola, Aniello Del Sorbo, Giuseppe Atenies...
ASIACRYPT
2005
Springer
14 years 5 months ago
Parallel Multi-party Computation from Linear Multi-secret Sharing Schemes
Abstract. As an extension of multi-party computation (MPC), we propose the concept of secure parallel multi-party computation which is to securely compute multi-functions against a...
Zhifang Zhang, Mulan Liu, Liangliang Xiao
ASIACRYPT
2005
Springer
14 years 5 months ago
A Near-Practical Attack Against B Mode of HBB
Stream cipher Hiji-Bij-Bij (HBB) was proposed by Sarkar at Indocrypt’03. This cipher uses cellular automata (CA). The algorithm has two modes: a basic mode (B) and a self-synchro...
Joydip Mitra