Sciweavers

5488 search results - page 1025 / 1098
» On the Secure Implementation of Security Protocols
Sort
View
NDSS
2003
IEEE
15 years 9 months ago
Fighting Spam by Encapsulating Policy in Email Addresses
Everyday network interactions require users to give out their email address, yet no guarantees can be made about how this address will be used. Sometimes the address is given to a...
John Ioannidis
SRDS
2003
IEEE
15 years 9 months ago
Federation Web: A Scheme to Compound Authorization Chains on Large-Scale Distributed Systems
Traditional security systems are not easily scalable and can become single points of failure or performance bottlenecks when used on a large-scale distributed system such as the I...
Altair Olivo Santin, Joni da Silva Fraga, Frank Si...
CAISE
2003
Springer
15 years 9 months ago
SIM-Filter: User Profile based Smart Information Filtering and Personalization in Smartcard
The emergence of new information and communication system technologies allow the appearance of new techniques of data processing. Thus, it is increasingly difficult to user to find...
Abdelkrim Lahlou, Pascal Urien
CEEMAS
2003
Springer
15 years 9 months ago
Airports for Agents: An Open MAS Infrastructure for Mobile Agents
Airports for Agents1 (AA) is an implemented distributed multi-agent infrastructure designed for dynamic and unstable Internet environment. The infrastructure consists of platforms ...
Jan Tozicka
CHES
2003
Springer
106views Cryptology» more  CHES 2003»
15 years 9 months ago
Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves
For most of the time since they were proposed, it was widely believed that hyperelliptic curve cryptosystems (HECC) carry a substantial performance penalty compared to elliptic cur...
Jan Pelzl, Thomas J. Wollinger, Jorge Guajardo, Ch...
« Prev « First page 1025 / 1098 Last » Next »