Sciweavers

191 search results - page 17 / 39
» Differentially secure multicasting and its implementation me...
Sort
View
AP2PC
2005
Springer
14 years 2 months ago
ACP2P: Agent-Community-based Peer-to-Peer Information Retrieval - an Evaluation
Abstract. The Agent-Community-based Peer-to-Peer Information Retrieval (ACP2P) method[1],[2] uses agent communities to manage and look up information of interest tousers. An agent ...
Tsunenori Mine, Akihiro Kogo, Makoto Amamiya
WAIFI
2010
Springer
158views Mathematics» more  WAIFI 2010»
13 years 6 months ago
On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings
Abstract. We focus on the implementation and security aspects of cryptographic protocols that use Type 1 and Type 4 pairings. On the implementation front, we report improved timing...
Sanjit Chatterjee, Darrel Hankerson, Alfred Meneze...
JCP
2008
116views more  JCP 2008»
13 years 8 months ago
Formal Verification and Visualization of Security Policies
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
IMA
2005
Springer
85views Cryptology» more  IMA 2005»
14 years 2 months ago
The Physically Observable Security of Signature Schemes
In recent years much research has been devoted to producing formal models of security for cryptographic primitives and to designing schemes that can be proved secure in such models...
Alexander W. Dent, John Malone-Lee
JMM
2007
107views more  JMM 2007»
13 years 8 months ago
Using a Spatial Context Authentication Proxy for Establishing Secure Wireless Connections
Spontaneous interaction in wireless ad-hoc networks is often desirable not only between users or devices in direct contact, but also with devices that are accessible only via a wi...
Rene Mayrhofer, Roswitha Gostner