Sciweavers

609 search results - page 47 / 122
» One-Time-Password-Authenticated Key Exchange
Sort
View
CRYPTO
2005
Springer
83views Cryptology» more  CRYPTO 2005»
14 years 3 months ago
A Practical Attack on a Braid Group Based Cryptographic Protocol
In this paper we present a practical heuristic attack on the Ko, Lee et al. key exchange protocol introduced at Crypto 2000 [10]. One of the ideas behind our attack is using Dehorn...
Alexei G. Myasnikov, Vladimir Shpilrain, Alexander...
ICTAC
2004
Springer
14 years 3 months ago
Switched Probabilistic I/O Automata
A switched probabilistic I/O automaton is a special kind of probabilistic I/O automaton (PIOA), enriched with an explicit mechanism to exchange control with its environment. Every ...
Ling Cheung, Nancy A. Lynch, Roberto Segala, Frits...
IWCM
2004
Springer
14 years 3 months ago
Complex Motion in Environmental Physics and Live Sciences
Abstract Image sequence processing techniques are an essential tool for the experimental investigation of dynamical processes such as exchange, growth, and transport processes. The...
Bernd Jähne
ICICS
2010
Springer
13 years 7 months ago
Efficient Authentication for Mobile and Pervasive Computing
With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of su...
Basel Alomair, Radha Poovendran
COMPSYSTECH
2009
13 years 7 months ago
Keeping artifacts alive: towards a knowledge management system
: The paper investigates first the role of artifacts in a cooperative work environment. It shows the different types of artifacts used in work groups. Then, it stresses the charact...
Hilda Tellioglu