Sciweavers

609 search results - page 40 / 122
» One-Time-Password-Authenticated Key Exchange
Sort
View
FC
2001
Springer
94views Cryptology» more  FC 2001»
14 years 2 months ago
Mutual Authentication for Low-Power Mobile Devices
We propose methods for mutual authentication and key exchange. Our methods are well suited for applications with strict power consumption restrictions, such as wireless medical imp...
Markus Jakobsson, David Pointcheval
EKAW
2000
Springer
14 years 1 months ago
OIL in a Nutshell
Currently computers are changing from single isolated devices into entry points into a worldwide network of information exchange and business transactions. Support in data, inform...
Dieter Fensel, Ian Horrocks, Frank van Harmelen, S...
ER
2007
Springer
111views Database» more  ER 2007»
14 years 4 months ago
Provability-Based Semantic Interoperability Via Translation Graphs
Provability-based semantic interoperability (PBSI) is a kind of interoperability that transcends mere syntactic translation to allow for robust, meaningful information exchange acr...
Joshua Taylor, Andrew Shilliday, Selmer Bringsjord
EUROMICRO
2003
IEEE
14 years 3 months ago
Towards A Classification Model for Component-Based Software Engineering Research
Accurate and timely information is a key motivator in the widespread adoption of CBSE technology in Europe. Although there are overlaps and informal communications between researc...
Gerald Kotonya, Ian Sommerville, Steve Hall
DBSEC
2003
157views Database» more  DBSEC 2003»
13 years 11 months ago
Systematic Development of a Family of Fair Exchange Protocols
: Fair exchange protocols play an important role in application areas such as e-commerce where protocol participants require mutual guarantees that a transaction involving exchange...
Paul D. Ezhilchelvan, Santosh K. Shrivastava