Sciweavers

609 search results - page 63 / 122
» One-Time-Password-Authenticated Key Exchange
Sort
View
MOBISYS
2007
ACM
14 years 9 months ago
Addressing security in medical sensor networks
We identify the security challenges facing a sensor network for wireless health monitoring, and propose an architecture called "SNAP" (Sensor Network for Assessment of P...
Kriangsiri Malasri, Lan Wang
NDSS
2008
IEEE
14 years 4 months ago
A New Privacy-Enhanced Matchmaking Protocol
Although several wide-spread internet applications (e.g., job-referral services, dating services) can benefit from online matchmaking, protocols defined over the past two decade...
Ji Sun Shin, Virgil D. Gligor
CISC
2007
Springer
156views Cryptology» more  CISC 2007»
14 years 3 months ago
Deniable Authentication on the Internet
Deniable authentication is a technique that allows one party to send messages to another while the latter can not prove to a third party the fact of communication. In this paper, w...
Shaoquan Jiang
CODES
2000
IEEE
14 years 2 months ago
Towards a new standard for system-level design
—Huge new design challenges for system-on-chip (SoC) are the result of decreasing time-to-market coupled with rapidly increasing gate counts and embedded software representing 50...
Stan Y. Liao
ADBIS
2010
Springer
203views Database» more  ADBIS 2010»
13 years 8 months ago
Detecting XML Functional Dependencies through Formal Concept Analysis
Abstract. As XML becomes a popular data representation and exchange format over the web, XML schema design has become an important research area. Formal Concept Analysis (FCA) has ...
Katalin Tunde Janosi-Rancz, Viorica Varga, Timea N...