Sciweavers

2261 search results - page 94 / 453
» Dynamic types for authentication
Sort
View
SPC
2005
Springer
14 years 2 months ago
Ephemeral Pairing on Anonymous Networks
The ephemeral pairing problem requires two or more specific physical nodes in a wireless broadcast network, that do not yet know each other, to establish a short-term relationship...
Jaap-Henk Hoepman
HPDC
2002
IEEE
14 years 1 months ago
A Secure Distributed Search System
This paper presents the design, implementationand evaluation of Mingle, a secure distributed search system. Each participatinghost runs a Mingle server, which maintains an inverte...
Yinglian Xie, David R. O'Hallaron, Michael K. Reit...
ASIACRYPT
2000
Springer
14 years 1 months ago
Concrete Security Characterizations of PRFs and PRPs: Reductions and Applications
Abstract. We investigate several alternate characterizations of pseudorandom functions (PRFs) and pseudorandom permutations (PRPs) in a concrete security setting. By analyzing the ...
Anand Desai, Sara K. Miner
CCS
2000
ACM
14 years 1 months ago
Security enhanced mobile agents
This paper describes a security model for mobile agent based systems. The model defines the notion of a security-enhanced agent and outlines security management components in agen...
Vijay Varadharajan
DIAL
2006
IEEE
129views Image Analysis» more  DIAL 2006»
14 years 19 days ago
Ink recognition based on statistical classification methods
Statistical classification methods can be applied on images of historical manuscript in order to characterize the various kinds of inks used. As these methods do not require destr...
Vasiliki Kokla, Alexandra Psarrou, Vassilis Konsta...