Sciweavers

731 search results - page 139 / 147
» New Security Results on Encrypted Key Exchange
Sort
View
USS
2004
13 years 9 months ago
Design of the EROS Trusted Window System
Window systems are the primary mediator of user input and output in modern computing systems. They are also a commonly used interprocess communication mechanism. As a result, they...
Jonathan S. Shapiro, John Vanderburgh, Eric Northu...
WICOMM
2008
258views more  WICOMM 2008»
13 years 7 months ago
Introducing reliability and load balancing in mobile IPv6-based networks
With the recent advances in portable devices and wireless networks, a new paradigm of computing has emerged which is known as mobile computing. In general mobile computing can be ...
Jahanzeb Faizan, Hesham El-Rewini, Mohamed Khalil
IACR
2011
112views more  IACR 2011»
12 years 7 months ago
A Domain Transformation for Structure-Preserving Signatures on Group Elements
We present a generic transformation that allows us to use a large class of pairing-based signatures to construct schemes for signing group elements in a structure preserving way. A...
Melissa Chase, Markulf Kohlweiss
HICSS
2003
IEEE
112views Biometrics» more  HICSS 2003»
14 years 25 days ago
Learning Through Telemedicine Networks
Telemedicine is advocated for its potential to improve the accessibility and quality of health care delivery while lowering costs [1]. Although the potential benefits of telemedic...
Liqiong Deng, Marshall Scott Poole
AAMAS
2004
Springer
13 years 7 months ago
A Manifesto for Agent Technology: Towards Next Generation Computing
The European Commission's eEurope initiative aims to bring every citizen, home, school, business and administration online to create a digitally literate Europe. The value lie...
Michael Luck, Peter McBurney, Chris Preist