Sciweavers

849 search results - page 73 / 170
» Evaluation of Security Protocols for the Session Initiation ...
Sort
View
ACISP
2010
Springer
13 years 9 months ago
One-Time-Password-Authenticated Key Exchange
To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive industries are deploying one-time password systems, where users have many pa...
Kenneth G. Paterson, Douglas Stebila
IFIP
2003
Springer
14 years 28 days ago
Dynamic Device Access for Mobile Users
The Dynamic Device Association (DDA) framework presented in this paper provides service discovery and secure device access for mobile users. We discuss scenarios and requirements f...
Dirk Kutscher, Jörg Ott
ALGOSENSORS
2007
Springer
14 years 1 months ago
Asynchronous Training in Wireless Sensor Networks
Scalable energy-efficient training protocols are proposed for massively-deployed sensor networks, where sensors are initially anonymous and unaware of their location. The protocol...
Ferruccio Barsi, Alan A. Bertossi, Francesco Betti...
CORR
2011
Springer
174views Education» more  CORR 2011»
13 years 2 months ago
Distributed Private Data Analysis: On Simultaneously Solving How and What
We examine the combination of two directions in the field of privacy concerning computations over distributed private inputs – secure function evaluation (SFE) and differential...
Amos Beimel, Kobbi Nissim, Eran Omri
26
Voted
CCR
2007
110views more  CCR 2007»
13 years 7 months ago
Future internet research and experimentation: the FIRE initiative
The research community worldwide has increasingly drawn its attention to the weaknesses of the current Internet. Many proposals are addressing the perceived problems, ranging from...
Anastasius Gavras, Arto Karila, Serge Fdida, Marti...