Sciweavers

985 search results - page 111 / 197
» On the validity of digital signatures
Sort
View
DIM
2005
ACM
14 years 2 days ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
COMCOM
2010
129views more  COMCOM 2010»
13 years 10 months ago
Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks
In this paper, we consider QoS aware mesh networks that are maintained by multiple operators and they cooperate in the provision of networking services to the mesh clients. In ord...
Levente Buttyán, László D&oac...
AC
2000
Springer
13 years 10 months ago
State of the art in electronic payment systems
nvented abstract representations of value. As time passed, representations of value became more abstract, progressing from barter through bank notes, payment orders, checks, credit...
N. Asokan, Philippe A. Janson, Michael Steiner, Mi...
APSEC
2003
IEEE
14 years 3 months ago
Ensuring Compatible Interactions within Component-based Software Systems
The interface definition of a component in a distributed system forms the contract between the component itself and its neighbouring components regarding the use of its services....
Jun Han, Ksze Kae Ker
JCP
2006
116views more  JCP 2006»
13 years 10 months ago
Building a Virtual Hierarchy for Managing Trust Relationships in a Hybrid Architecture
Trust models provide a framework to create and manage trust relationships among the different entities of a Public Key Infrastructure (PKI). These trust relationships are verified ...
Cristina Satizábal, Rafael Páez, Jor...