Sciweavers

5488 search results - page 1019 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
ITCC
2005
IEEE
15 years 10 months ago
A Mobile Commerce Framework Based on Web Services Architecture
“Mobile Internet” arguably means more than just a new technique for communication; many analysts believe that it will revolutionize the business world and innovate the way ind...
Yao-Chung Chang, Jiann-Liang Chen, Wen-Ming Tseng
MOBIQUITOUS
2005
IEEE
15 years 10 months ago
Practical Broadcast Authentication in Sensor Networks
Broadcast authentication is a critical security service in sensor networks; it allows a sender to broadcast messages to multiple nodes in an authenticated way. µTESLA and multi-l...
Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodi...
SC
2005
ACM
15 years 10 months ago
An Adaptive Visual Analytics Platform for Mobile Devices
We present the design and implementation of InfoStar, an adaptive visual analytics platform for mobile devices such as PDAs, laptops, Tablet PCs and mobile phones. InfoStar extends...
Antonio Sanfilippo, Richard May, Gary Danielson, B...
CRYPTO
2005
Springer
120views Cryptology» more  CRYPTO 2005»
15 years 10 months ago
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
We identify and fill some gaps with regard to consistency (the extent to which false positives are produced) for public-key encryption with keyword search (PEKS), providing new de...
Michel Abdalla, Mihir Bellare, Dario Catalano, Eik...
FC
2005
Springer
97views Cryptology» more  FC 2005»
15 years 10 months ago
Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure
Abstract. We propose a scheme for privacy-preserving escrow of financial transactions. The objective of the scheme is to preserve privacy and anonymity of the individual user enga...
Stanislaw Jarecki, Vitaly Shmatikov
« Prev « First page 1019 / 1098 Last » Next »