Sciweavers

1059 search results - page 144 / 212
» Modeling Security Protocols as Games
Sort
View
WOA
2010
13 years 7 months ago
Using Mobile Agents for Secure Biometric Authentication
This paper deals with the definition of a strong authentication model, coupling usual password/PIN based methods with a biometric matching, over a Multi Agent distributed infrastru...
Marco Tranquillin, Carlo Ferrari, Michele Moro
WECWIS
2007
IEEE
148views ECommerce» more  WECWIS 2007»
14 years 4 months ago
The Core and Shapley Value Analysis for Cooperative Formation of Procurement Networks
Formation of high value procurement networks involves a bottom-up assembly of complex production, assembly, and exchange relationships through supplier selection and contracting d...
T. S. Chandrashekar, Y. Narahari
TIT
2008
187views more  TIT 2008»
13 years 9 months ago
The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement
Abstract--In the bounded-storage model (BSM) for information-theoretic secure encryption and key agreement, one makes use of a random string R whose length t is greater than the as...
Stefan Dziembowski, Ueli M. Maurer
ICDE
2007
IEEE
124views Database» more  ICDE 2007»
14 years 4 months ago
Secure Content Validation
Information dissemination in electronic form has improved drastically over the past few years. New technologies in web feeds allow the uses to get notified automatically when new...
Mummoorthy Murugesan, Wei Jiang
ISCI
2008
160views more  ISCI 2008»
13 years 10 months ago
Certificateless undeniable signature scheme
In this paper, we present the first certificateless undeniable signature scheme. The scheme does not suffer from the key escrow problem, which is inherent in identity based crypto...
Shanshan Duan