Sciweavers

1116 search results - page 88 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
NDSS
2003
IEEE
14 years 1 months ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the serverâ...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
TMC
2012
11 years 10 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
WWW
2005
ACM
14 years 8 months ago
Static approximation of dynamically generated Web pages
Server-side programming is one of the key technologies that support today's WWW environment. It makes it possible to generate Web pages dynamically according to a user's...
Yasuhiko Minamide
HCI
2009
13 years 5 months ago
An Open Source Framework for Real-Time, Incremental, Static and Dynamic Hand Gesture Learning and Recognition
Real-time, static and dynamic hand gesture learning and recognition makes it possible to have computers recognize hand gestures naturally. This creates endless possibilities in the...
Todd C. Alexander, Hassan S. Ahmed, Georgios C. An...
FC
1999
Springer
160views Cryptology» more  FC 1999»
14 years 8 days ago
Anonymous Authentication of Membership in Dynamic Groups
Abstract. We present a series of protocols for authenticating an individual’s membership in a group without revealing that individual’s identity and without restricting how the...
Stuart E. Schechter, Todd Parnell, Alexander J. Ha...