Sciweavers

62 search results - page 7 / 13
» Flexible and Scalable Public Key Security for SSH
Sort
View
CARDIS
1998
Springer
103views Hardware» more  CARDIS 1998»
13 years 11 months ago
Secure Personalization Using Proxy Cryptography
In this paper we describe new secure personalization schemes using proxy cryptography. We first introduce the context of a large scale smart card application such as an electronic ...
Pierre Girard
HICSS
2000
IEEE
109views Biometrics» more  HICSS 2000»
13 years 11 months ago
Scalable and Secure Resource Location
In this paper we present Captain Cook, a service that continuously monitors resources in the Internet, and allows clients to locate resources using this information. Captain Cook ...
Robbert van Renesse
PERVASIVE
2006
Springer
13 years 7 months ago
Scalability in a Secure Distributed Proof System
Abstract. A logic-based language is often adopted in systems for pervasive computing, because it provides a convenient way to define rules that change the behavior of the systems d...
Kazuhiro Minami, David Kotz
CMS
2003
120views Communications» more  CMS 2003»
13 years 8 months ago
Extending the SDSI / SPKI Model through Federation Webs
Classic security systems use a trust model centered in the authentication procedure, which depends on a naming service. Even when using a Public Key Infrastructure as X.509, such s...
Altair Olivo Santin, Joni da Silva Fraga, Carlos M...
ASIACRYPT
2004
Springer
14 years 25 days ago
Constant-Round Authenticated Group Key Exchange for Dynamic Groups
Abstract. An authenticated group key exchange (AGKE) scheme allows a group of users in a public network to share a session key which may later be used to achieve desirable cryptogr...
Hyun-Jeong Kim, Su-Mi Lee, Dong Hoon Lee