Sciweavers

609 search results - page 37 / 122
» One-Time-Password-Authenticated Key Exchange
Sort
View
ACISP
2004
Springer
14 years 1 months ago
Secure Bilinear Diffie-Hellman Bits
The Weil and Tate pairings are a popular new gadget in cryptography and have found many applications, including identity-based cryptography. In particular, the pairings have been u...
Steven D. Galbraith, Herbie J. Hopkins, Igor Shpar...
ISEM
2006
90views more  ISEM 2006»
13 years 10 months ago
Using GXL for exchanging business process models
Abstract The GXL Graph eXchange Language is an XML-based standard exchange language for sharing graph data between tools. GXL can be customized to exchange application specific typ...
Andreas Winter, Carlo Simon
PODS
2010
ACM
242views Database» more  PODS 2010»
14 years 3 months ago
Certain answers for XML queries
The notion of certain answers arises when one queries incompletely specified databases, e.g., in data integration and exchange scenarios, or databases with missing information. W...
Claire David, Leonid Libkin, Filip Murlak
CSFW
2005
IEEE
14 years 3 months ago
Analysis of Typed Analyses of Authentication Protocols
This paper contrasts two existing type-based techniques for the analysis of authentication protocols. The former, proposed by Gordon and Jeffrey, uses dependent types for nonces a...
Michele Bugliesi, Riccardo Focardi, Matteo Maffei
AIMS
2010
Springer
14 years 2 months ago
On the Combined Behavior of Autonomous Resource Management Agents
Abstract. A central issue in autonomic management is how to coordinate several autonomic management processes, which is assumed to require significant knowledge exchange. This stu...
Siri Fagernes, Alva L. Couch