Sciweavers

2261 search results - page 12 / 453
» Dynamic types for authentication
Sort
View
ASIACRYPT
2004
Springer
15 years 8 months ago
Constant-Round Authenticated Group Key Exchange for Dynamic Groups
Abstract. An authenticated group key exchange (AGKE) scheme allows a group of users in a public network to share a session key which may later be used to achieve desirable cryptogr...
Hyun-Jeong Kim, Su-Mi Lee, Dong Hoon Lee
CE
2006
161views more  CE 2006»
15 years 2 months ago
Applying an authentic, dynamic learning environment in real world business
This paper describes a dynamic computer-based business learning environment and the results from applying it in a real-world business organization. We argue for using learning too...
Timo Lainema, Sami Nurmi
98
Voted
ISPEC
2007
Springer
15 years 8 months ago
Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems
Considerable research and experiment results in recent years have shown that the server-proxy-user architecture represents an efficient and scalable new paradigm for multimedia con...
Robert H. Deng, Yanjiang Yang
118
Voted
IMECS
2007
15 years 3 months ago
Multi-Application Authentication Based on Multi-Agent System
— This paper proposes an authentication approach to support multi-clients in using a multi-application based environment. The approach is primarily based on the public key infras...
Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Jun...
FC
1999
Springer
160views Cryptology» more  FC 1999»
15 years 6 months ago
Anonymous Authentication of Membership in Dynamic Groups
Abstract. We present a series of protocols for authenticating an individual’s membership in a group without revealing that individual’s identity and without restricting how the...
Stuart E. Schechter, Todd Parnell, Alexander J. Ha...