Sciweavers

609 search results - page 36 / 122
» One-Time-Password-Authenticated Key Exchange
Sort
View
CSEE
2009
Springer
14 years 4 months ago
An Examination of Learning Technologies That Support Software Engineering and Education
Advancing Software Engineering (SwE) through Education takes not only commitment and understanding of some key principals, but also requires a tight integration with technologies ...
Mel Rosso-Llopart
AAECC
2006
Springer
125views Algorithms» more  AAECC 2006»
13 years 10 months ago
Combinatorial Group Theory and Public Key Cryptography
Abstract. After some excitement generated by recently suggested public key exchange protocols due to Anshel-Anshel-Goldfeld and Ko-Lee et al., it is a prevalent opinion now that th...
Vladimir Shpilrain, Gabriel Zapata
IJNSEC
2006
78views more  IJNSEC 2006»
13 years 10 months ago
Authentication and Key Agreement Protocols Preserving Anonymity
Anonymity is a very important security feature in addition to authentication and key agreement features in communication protocols. In this paper, we propose two authentication an...
Kumar V. Mangipudi, Rajendra S. Katti, Huirong Fu
WIMOB
2008
IEEE
14 years 4 months ago
Random Beacon for Privacy and Group Security
Abstract—Most contemporary security mechanisms and protocols include exchange of random or time-variant nonces as an essential means of protection against replay and other threat...
Aleksi Saarela, Jan-Erik Ekberg, Kaisa Nyberg
BPM
2005
Springer
112views Business» more  BPM 2005»
14 years 3 months ago
Supporting Business Experts in the Design of B2B Transactions Through Interactive Process Simulation
: The paper presents a toolkit for the design and the interactive validation of message-based document exchange within the context of multi-partner electronic business transactions...
Michael Schmitt, Christophe Incoul, Eric Dubois