Sciweavers

322 search results - page 34 / 65
» Entity Authentication and Key Distribution
Sort
View
CCS
2010
ACM
13 years 6 months ago
Developing security protocols by refinement
We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides sformation of abstract security goals into protocols that are s...
Christoph Sprenger, David A. Basin
SI3D
1995
ACM
14 years 2 days ago
RING: A Client-Server System for Multi-User Virtual Environments
This paper describes the client-server design, implementation and experimental results for a system that supports real-time visual interaction between a large number of users in a...
Thomas A. Funkhouser
SKG
2006
IEEE
14 years 2 months ago
An Extended OCSP Protocol for Grid CA Cross-certification
In grid environment, there are many administrative domains, each domain has its own CA, and entities in different domains need authentication when accessing each other. The OCSP (...
Shaomin Zhang, Huitao Gong, Baoyi Wang
ML
2006
ACM
110views Machine Learning» more  ML 2006»
13 years 8 months ago
Distribution-based aggregation for relational learning with identifier attributes
Abstract Identifier attributes--very high-dimensional categorical attributes such as particular product ids or people's names--rarely are incorporated in statistical modeling....
Claudia Perlich, Foster J. Provost
CCS
2007
ACM
14 years 2 months ago
Alpaca: extensible authorization for distributed services
Traditional Public Key Infrastructures (PKI) have not lived up to their promise because there are too many ways to define PKIs, too many cryptographic primitives to build them wi...
Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, ...