Sciweavers

250 search results - page 10 / 50
» Modeling Public Key Infrastructures in the Real World
Sort
View
ISCI
2010
146views more  ISCI 2010»
13 years 7 months ago
Simulatable certificateless two-party authenticated key agreement protocol
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to preve...
Lei Zhang 0009, Futai Zhang, Qianhong Wu, Josep Do...
FC
2009
Springer
100views Cryptology» more  FC 2009»
14 years 4 months ago
Expecting the Unexpected: Towards Robust Credential Infrastructure
Cryptographic credential infrastructures, such as Public key infrastructure (PKI), allow the building of trust relationships in electronic society and electronic commerce. At the c...
Shouhuai Xu, Moti Yung
HICSS
2007
IEEE
99views Biometrics» more  HICSS 2007»
14 years 4 months ago
Examining the Impacts of Institutional Framework on E-Government Infrastructures: A Study of Hong Kong Experiences
Since the Hong Kong SAR Government promulgated the first Digital 21 IT Strategy in November 1998, multiple major initiatives had been launched to establish the underlying infrastr...
Chun Yu, Paul Jen-Hwa Hu
ACSAC
1999
IEEE
14 years 2 months ago
Generic Support for PKIX Certificate Management in CDSA
The Common Data Security Architecture (CDSA) from the Open Group is a flexible standard that defines APIs for security services needed for implementing Public Key Infrastructure (...
Shabnam Erfani, C. Sekar Chandersekaran
CVPR
2010
IEEE
14 years 3 months ago
Learning Appearance in Virtual Scenarios for Pedestrian Detection
Detecting pedestrians in images is a key functionality to avoid vehicle-to-pedestrian collisions. The most promising detectors rely on appearance-based pedestrian classifiers tra...
Francisco Marin Tur, David Vazquez, David Geronimo...