Sciweavers

609 search results - page 39 / 122
» One-Time-Password-Authenticated Key Exchange
Sort
View
ENTCS
2006
145views more  ENTCS 2006»
13 years 10 months ago
Real-or-random Key Secrecy of the Otway-Rees Protocol via a Symbolic Security Proof
We present the first cryptographically sound security proof of the well-known Otway-Rees protocol. More precisely, we show that the protocol is secure against arbitrary active att...
Michael Backes
IFIP12
2004
13 years 11 months ago
Using Agents in the Exchange of Product Data
: This paper describes using agents in the exchange of industrial product data when predefined translators are not available. A major problem with standard translators is that a se...
Udo Kannengiesser, John S. Gero
ER
2006
Springer
132views Database» more  ER 2006»
14 years 1 months ago
Schema-Mediated Exchange of Temporal XML Data
When web servers publish data formatted in XML, only the current state of the data is (generally) published. But data evolves over time as it is updated. Capturing that evolution i...
Curtis E. Dyreson, Richard T. Snodgrass, Faiz Curr...
IJNSEC
2006
110views more  IJNSEC 2006»
13 years 10 months ago
The Improvement of YSYCT Scheme for Imbalanced Wireless Network
Recently, Yeh et al. proposed an improved password authenticated key exchange scheme (YSYCT scheme) which is secure against undetectable on-line password guessing attacks and prov...
Jung-Wen Lo
DAGM
2003
Springer
14 years 3 months ago
Image Sequence Analysis in Environmental and Live Sciences
Image sequence processing techniques are essential to study dynamical processes such as exchange, growth, and transport processes. In this survey paper, a generalized framework for...
Bernd Jähne