Sciweavers

609 search results - page 109 / 122
» One-Time-Password-Authenticated Key Exchange
Sort
View
EUROCRYPT
2004
Springer
13 years 11 months ago
Secure Hashed Diffie-Hellman over Non-DDH Groups
We show that in applications that use the Diffie-Hellman (DH) transform but take care of hashing the DH output (as required, for example, for secure DH-based encryption and key ex...
Rosario Gennaro, Hugo Krawczyk, Tal Rabin
CRYPTO
2006
Springer
159views Cryptology» more  CRYPTO 2006»
13 years 11 months ago
Asymptotically Optimal Two-Round Perfectly Secure Message Transmission
Abstract. The problem of perfectly secure message transmission concerns two synchronized non-faulty processors sender (S) and receiver (R) that are connected by a synchronous netwo...
Saurabh Agarwal, Ronald Cramer, Robbert de Haan
ER
2006
Springer
121views Database» more  ER 2006»
13 years 11 months ago
XBRL Taxonomies and OWL Ontologies for Investment Funds
The analysis of investment funds information requires the availability of homogeneous, both up-to-date and historical information of the funds considered, which is usually generate...
Rubén Lara, Iván Cantador, Pablo Cas...
EKAW
2000
Springer
13 years 11 months ago
What's in an Electronic Business Model?
An electronic business model is an important baseline for the development of e-commerce system applications. Essentially, it provides the design rationale for e-commerce systems fr...
Jaap Gordijn, Hans Akkermans, Hans van Vliet
TES
2000
Springer
13 years 11 months ago
Active Rules for XML: A New Paradigm for E-Services
XML is rapidly becoming one of the most widely adopted technologies for information exchange and representation. As the use of XML becomes more widespread, we foresee the developme...
Angela Bonifati, Stefano Ceri, Stefano Paraboschi