Sciweavers

609 search results - page 65 / 122
» One-Time-Password-Authenticated Key Exchange
Sort
View
ACNS
2009
Springer
168views Cryptology» more  ACNS 2009»
14 years 4 months ago
How to Extract and Expand Randomness: A Summary and Explanation of Existing Results
Abstract. We examine the use of randomness extraction and expansion in key agreement (KA) protocols to generate uniformly random keys in the standard model. Although existing works...
Yvonne Cliff, Colin Boyd, Juan Manuel Gonzá...
ICC
2007
IEEE
125views Communications» more  ICC 2007»
14 years 4 months ago
SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography
In a wireless network composed of multiple access points, a long delay during roaming from one access point to another may cause a disruption for streaming traffic. Roaming in wire...
Yoohwan Kim, Wei Ren, Ju-Yeon Jo, Yingtao Jiang, J...
SERVICES
2008
71views more  SERVICES 2008»
13 years 11 months ago
Identifying Opportunities for Web Services Security Performance Optimizations
WS-Security is an essential component of the Web services protocol stack. WS-Security provides end-to-end security properties, thereby assuring the participation of nonsecure tran...
Robert A. van Engelen, Wei Zhang
BIB
2007
124views more  BIB 2007»
13 years 9 months ago
Informatics in neuroscience
The application of informatics to neuroscience goes far beyond ‘traditional’ bioinformatics modalities such as DNA sequences. In this review, we describe how informatics is be...
Leon French, Paul Pavlidis
MFCS
1990
Springer
14 years 1 months ago
One-Way Functions in Complexity Theory
We introduce the notion of associative one-way functions and prove that they exist if and only if P 6= NP. As evidence of their utility, we present two novel protocols that apply ...
Alan L. Selman