Sciweavers

1102 search results - page 80 / 221
» Distributed Key Generation for the Internet
Sort
View
ESWS
2009
Springer
15 years 9 months ago
Middleware for Automated Implementation of Security Protocols
We propose a middleware for automated implementation of security protocols for Web services. The proposed middleware consists of two main layers: the communication layer and the se...
Béla Genge, Piroska Haller
CCGRID
2005
IEEE
15 years 8 months ago
A grid-based HIV expert system
ABSTRACT. Objectives. This paper addresses Grid-based integration and access of distributed data from infectious disease patient databases, literature on in-vitro and in-vivo pharm...
Peter M. A. Sloot, Alexander Boukhanovsky, Wilco K...
COMCOM
2010
136views more  COMCOM 2010»
15 years 2 months ago
D-MORE: Dynamic mesh-based overlay peer-to-peer infrastructure
Traditionally, Internet Service Providers (ISPs) have to interconnect with content providers to provide network services to customers. The current business model that connectivity...
Jun Lei, Xiaoming Fu, Dieter Hogrefe
ISW
2001
Springer
15 years 6 months ago
Suitability of a Classical Analysis Method for E-commerce Protocols
We present the adaptation of our model for the validation of key distribution and authentication protocols to address specific needs of protocols for electronic commerce. The two ...
Sigrid Gürgens, Javier Lopez
133
Voted
INDOCRYPT
2004
Springer
15 years 7 months ago
New ID-Based Threshold Signature Scheme from Bilinear Pairings
ID-based public key systems allow the user to use his/her identity as the public key, which can simplify key management procedure compared with CA-based public key systems. However...
Xiaofeng Chen, Fangguo Zhang, Divyan M. Konidala, ...