Sciweavers

1150 search results - page 117 / 230
» Beacon Based Authentication
Sort
View
ISCC
2009
IEEE
170views Communications» more  ISCC 2009»
14 years 3 months ago
A directly public verifiable signcryption scheme based on elliptic curves
A directly public verifiable signcryption scheme is introduced in this paper that provides the security attributes of message confidentiality, authentication, integrity, non-repud...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
AINA
2004
IEEE
14 years 21 days ago
An Access Control Model Based on Distributed Knowledge Management
The conceptual architecture of the access control system described here is based on automatic distributed acquisition and processing of knowledge about users and devices in comput...
Alexandr Seleznyov, Stephen Hailes
CIIT
2007
131views Communications» more  CIIT 2007»
13 years 10 months ago
Intra-federation credential negotiation based on individualized release strategy
In federated world like Shibboleth the release policy- how a member’s personal information to be divulged is set by their home organization. The member has little say in it. In ...
Javed I. Khan, Kailas B. Bobade, Manas Hardas
JCM
2008
69views more  JCM 2008»
13 years 9 months ago
Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks
We present a scheme based on the Blom scheme for resisting the Sybil type attacks. In this scheme, the authority pre-distributes the combination of the secret used in the Blom sche...
Shiuh-Jeng Wang, Yuh-Ren Tsai, Chung-Wei Chen
AMC
2005
188views more  AMC 2005»
13 years 8 months ago
An efficient signcryption scheme with forward secrecy based on elliptic curve
An efficient signcryption scheme based on elliptic curve is proposed in this paper. The signcryption scheme combines digital signature and encryption functions. The proposed schem...
Ren-Junn Hwang, Chih-Hua Lai, Feng-Fu Su