Sciweavers

609 search results - page 26 / 122
» One-Time-Password-Authenticated Key Exchange
Sort
View
CEE
2010
66views more  CEE 2010»
13 years 10 months ago
Enhancements of authenticated multiple key exchange protocol based on bilinear pairings
Duc-Liem Vo, Hyunrok Lee, Chan-Yeob Yeun, Kwangjo ...
IJNSEC
2008
69views more  IJNSEC 2008»
13 years 10 months ago
Proof of Forward Security for Password-based Authenticated Key Exchange
Recently, M. Abdalla et al. proposed a slightly different variant of AuthA, based on the scheme proposed by E. Bresson et al., and provided the first complete proof of forward-sec...
Shuhua Wu, Yuefei Zhu
JOC
2006
67views more  JOC 2006»
13 years 10 months ago
Threshold Password-Authenticated Key Exchange
Philip D. MacKenzie, Thomas Shrimpton, Markus Jako...
ICC
2007
IEEE
123views Communications» more  ICC 2007»
14 years 4 months ago
Cross-Layer Optimization With Model-Based Parameter Exchange
— Cross-layer optimization (CLO) promises significant gains in comparison to a conventional system design, which does not allow for information exchange across layers. One of th...
Andreas Saul, Shoaib Khan, Gunther Auer, Wolfgang ...
BIRTHDAY
2009
Springer
14 years 4 months ago
Clio: Schema Mapping Creation and Data Exchange
Abstract. The Clio project provides tools that vastly simplify information integration. Information integration requires data conversions to bring data in different representation...
Ronald Fagin, Laura M. Haas, Mauricio A. Hern&aacu...