Sciweavers

609 search results - page 110 / 122
» One-Time-Password-Authenticated Key Exchange
Sort
View
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
13 years 9 months ago
An Authentication Scheme Based on the Twisted Conjugacy Problem
The conjugacy search problem in a group G is the problem of recovering an x G from given g G and h = x-1 gx. The alleged computational hardness of this problem in some groups was...
Vladimir Shpilrain, Alexander Ushakov
CCE
2007
13 years 9 months ago
Context-aware Integration of Collaboration Services for the Support of Mobile Field Operations
: This paper describes concepts for using contextual information in an advanced service environment for the support of mobile maintenance processes. We focus on spatio-temporal con...
Heinz-Josef Eikerling, Matthias Benesch, Frank Ber...
ICWS
2008
IEEE
13 years 9 months ago
Communications Semantics for WSBPEL Processes
WSBPEL [2] opens up the possibility of applying a range of formal techniques to the verification of Web service behaviors from two points of view: constraints between activities w...
Walid Fdhila, Mohsen Rouached, Claude Godart
LREC
2008
150views Education» more  LREC 2008»
13 years 9 months ago
The 2008 Oriental COCOSDA Book Project: in Commemoration of the First Decade of Sustained Activities in Asia
The purpose of Oriental COCOSDA is to provide the Asian community a platform to exchange ideas, to share information and to discuss regional matters on creation, utilization, diss...
Shuichi Itahashi, Chiu-yu Tseng
LANMR
2007
13 years 9 months ago
Dialetheic truth theory: inconsistency, non-triviality, soundness, incompleteness
The best-known application of dialetheism is to semantic paradoxes such as the Liar. In particular, Graham Priest has advocated the adoption of an axiomatic truth theory in which c...
Federico Marulanda Rey