Sciweavers

609 search results - page 49 / 122
» One-Time-Password-Authenticated Key Exchange
Sort
View
ICCCN
2007
IEEE
14 years 4 months ago
SpotMAC: A Pencil-Beam MAC for Wireless Mesh Networks
Abstract— Deafness is a key problem. It erodes the performance gains provided by directional antennas, and introduces a new hidden terminal problem. To address deafness, and henc...
Kwan-Wu Chin
SPC
2005
Springer
14 years 3 months ago
Ephemeral Pairing on Anonymous Networks
The ephemeral pairing problem requires two or more specific physical nodes in a wireless broadcast network, that do not yet know each other, to establish a short-term relationship...
Jaap-Henk Hoepman
APSEC
2000
IEEE
14 years 2 months ago
An adaptive distributed workflow system framework
Workflow management systems are increasingly used to assist the automation of business processes that involve the exchange of documents, information, or task execution results. Re...
Martin K. Purvis, Maryam Purvis, Selena Lemalu
ARITH
1999
IEEE
14 years 2 months ago
Moduli for Testing Implementations of the RSA Cryptosystem
Comprehensive testing of any implementation of the RSA cryptosystem requires the use of a number of moduli with specific properties. It is shown how to generate a sufficient varie...
Colin D. Walter
JECR
2002
151views more  JECR 2002»
13 years 9 months ago
The Ethics of eBanking
In this paper we explore the ethics of business-to-business electronic commerce, with a focus on the banking sector. A case study of online foreign exchange developments at an inv...
Lisa Harris, Laura J. Spence