Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Mar 18, 2008 · Abstract: We introduce a simple, practical approach with probabilistic information-theoretic security to solve one of quantum key ...
Aug 21, 2009 · We introduce a simple, practical approach with probabilistic information-theoretic security to solve one of quantum key distribution's major ...
Aug 21, 2009 · Distributed authentication for randomly compromised networks. To cite this article: Travis R Beals et al 2009 New J. Phys. 11 085005. View the ...
Our scheme employs classical secret sharing and partially trusted intermediaries to provide arbitrarily high confidence in the security of the protocol.
We introduce a simple, practical approach with probabilistic information-theoretic security to solve one of quantum key distribution's major security ...
People also ask
Sep 18, 2013 · We introduce a simple, practical approach with probabilistic information-theoretic security to solve one of quantum key distribution's major ...
A distributed system is susceptible to a variety of security threats. A principal can impersonate other principal and authentication becomes an.
A user is allowed initial access to the distributed service with a password. The use of the distributed service is then restricted to the user upon entering the ...
Abstract. In this work we present a security model for low-value trans- actions in ad-hoc networks in which we focus on authentication since this.
We implement a password authentication system on top of ThresholdDB to provide distributed password- authenticated key exchange. 1 INTRODUCTION. Recently ...