Sciweavers

503 search results - page 23 / 101
» Authenticity by tagging and typing
Sort
View
TWC
2008
122views more  TWC 2008»
13 years 8 months ago
TSVC: timed efficient and secure vehicular communications with privacy preserving
In this paper, we propose a Timed Efficient and Secure Vehicular Communication (TSVC) scheme with privacy preservation, which aims at minimizing the packet overhead in terms of sig...
Xiaodong Lin, Xiaoting Sun, Xiaoyu Wang, Chenxi Zh...
HT
2007
ACM
14 years 18 days ago
Towards better understanding of folksonomic patterns
Folksonomies provide a free source of keywords describing web resources; however, these keywords are free form and their semantics spans multiple contextual dimension. In this pap...
Hend S. Al-Khalifa, Hugh C. Davis
CORR
2008
Springer
141views Education» more  CORR 2008»
13 years 8 months ago
Cryptanalysis of Yang-Wang-Chang's Password Authentication Scheme with Smart Cards
In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password authentication scheme in an attempt to overcome the flaws of Yang-Shieh's legendary timestamp-base...
Al-Sakib Khan Pathan, Choong Seon Hong
TKDE
2010
186views more  TKDE 2010»
13 years 7 months ago
A Unified Framework for Providing Recommendations in Social Tagging Systems Based on Ternary Semantic Analysis
—Social Tagging is the process by which many users add metadata in the form of keywords, to annotate and categorize items (songs, pictures, web links, products, etc.). Social tag...
Panagiotis Symeonidis, Alexandros Nanopoulos, Yann...
CSFW
2000
IEEE
14 years 1 months ago
How to Prevent Type Flaw Attacks on Security Protocols
A type flaw attack on a security protocol is an attack where a field that was originally intended to have one type is subsequently interpreted as having another type. A number o...
James Heather, Gavin Lowe, Steve Schneider