Sciweavers

609 search results - page 41 / 122
» One-Time-Password-Authenticated Key Exchange
Sort
View
ECSCW
2007
13 years 11 months ago
Instrumental action: the timely exchange of implements during surgical operations
In this paper we analyse an apparently simple collaborative activity, that of passing an implement from one person to another. The particular case we consider is surgical operation...
Marcus Sanchez Svensson, Christian Heath, Paul Luf...
CCS
2005
ACM
14 years 3 months ago
Modeling insider attacks on group key-exchange protocols
Protocols for authenticated key exchange (AKE) allow parties within an insecure network to establish a common session key which can then be used to secure their future communicati...
Jonathan Katz, Ji Sun Shin
ACISP
1998
Springer
14 years 2 months ago
Detecting Key-Dependencies
The confidentiality of encrypted data depends on how well the key under which it was encrypted is maintained. If a session key was exchanged encrypted under a long-term key, exposu...
Tage Stabell-Kulø, Arne Helme, Gianluca Din...
IADIS
2003
13 years 11 months ago
A New Key Distribution Scheme for Secure Multicast Communications
In this short paper, we propose a new key management architecture for Multicast communications. This architecture combines the complementary variable approach with hashed keys and...
Martin St-Amand, Boucif Amar Bansaber, Dominique S...
INTERACT
2003
13 years 11 months ago
Key Functionalities of SAP Community
: The SAP Community is a platform for a true virtual community where people and companies come together to exchange ideas, solve problems, benefit from stimulating advice, and coll...
Raimund Mollenhauer