Sciweavers

1116 search results - page 51 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
IJNSEC
2008
127views more  IJNSEC 2008»
13 years 8 months ago
Reducing Communication Overhead for Wireless Roaming Authentication: Methods and Performance Evaluation
The protocol design for wireless roaming authentication is challenging because of the key management regarding users and home/visited networks. In this paper, we present two authe...
Men Long, Chwan-Hwa John Wu, J. David Irwin
BIB
2007
137views more  BIB 2007»
13 years 8 months ago
Current progress in network research: toward reference networks for key model organisms
The collection of multiple genome-scale datasets is now routine, and the frontier of research in systems biology has shifted accordingly. Rather than clustering a single dataset t...
Balaji S. Srinivasan, Nigam H. Shah, Jason Flannic...
ICCV
2011
IEEE
12 years 8 months ago
Key-Segments for Video Object Segmentation
We present an approach to discover and segment foreground object(s) in video. Given an unannotated video sequence, the method first identifies object-like regions in any frame a...
Yong Jae Lee, Jaechul Kim, Kristen Grauman
CTRSA
2010
Springer
191views Cryptology» more  CTRSA 2010»
13 years 11 months ago
Making the Diffie-Hellman Protocol Identity-Based
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [33]) each party uses its own identity as public key and rece...
Dario Fiore, Rosario Gennaro
IPPS
2007
IEEE
14 years 2 months ago
Authentication in Reprogramming of Sensor Networks for Mote Class Adversaries
Reprogramming is an essential service for wireless sensor networks. Authenticating reprogramming process is important as sensors need to verify that the code image is truly from a...
Limin Wang, Sandeep S. Kulkarni