Sciweavers

121 search results - page 21 / 25
» Identity-based key agreement protocols from pairings
Sort
View
CHES
2006
Springer
133views Cryptology» more  CHES 2006»
13 years 11 months ago
Fast Generation of Prime Numbers on Portable Devices: An Update
The generation of prime numbers underlies the use of most public-key cryptosystems, essentially as a primitive needed for the creation of RSA key pairs. Surprisingly enough, despit...
Marc Joye, Pascal Paillier
ECWEB
2003
Springer
114views ECommerce» more  ECWEB 2003»
14 years 17 days ago
Enhancing E-commerce Security Using GSM Authentication
Abstract. Today, e-commerce transactions are typically protected using SSL/TLS. However, there are risks in such use of SSL/TLS, notably threats arising from the fact that informat...
Vorapranee Khu-smith, Chris J. Mitchell
PLDI
2012
ACM
11 years 9 months ago
Speculative linearizability
Linearizability is a key design methodology for reasoning about tations of concurrent abstract data types in both shared memory and message passing systems. It provides the illusi...
Rachid Guerraoui, Viktor Kuncak, Giuliano Losa
ERSA
2010
115views Hardware» more  ERSA 2010»
13 years 5 months ago
Towards Adaptive Networking for Embedded Devices based on Reconfigurable Hardware
Research in communication networks has shown that the Internet architecture is not sufficient for modern communication areas such as the interconnection networks of super computing...
Enno Lübbers, Marco Platzner, Christian Pless...
AICT
2010
IEEE
240views Communications» more  AICT 2010»
12 years 11 months ago
Providing Security in 4G Systems: Unveiling the Challenges
— Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. Since designing an efficient security module requires a cl...
Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae, ...