Sciweavers

609 search results - page 70 / 122
» One-Time-Password-Authenticated Key Exchange
Sort
View
ICIP
2010
IEEE
13 years 7 months ago
Deterministic structured network coding for WWAN video broadcast with cooperative peer-to-peer repair
Recent research has exploited the multi-homing property (one terminal with multiple network interfaces) of modern devices to improve communication performance in wireless networks...
Xin Liu, Gene Cheung, Chen-Nee Chuah
ICDT
2012
ACM
251views Database» more  ICDT 2012»
12 years 1 days ago
Computing universal models under guarded TGDs
A universal model of a database D and a set Σ of integrity constraints is a database that extends D, satisfies Σ, and is most general in the sense that it contains sound and co...
André Hernich
SP
1997
IEEE
139views Security Privacy» more  SP 1997»
14 years 1 months ago
Number Theoretic Attacks on Secure Password Schemes
Encrypted Key Exchange (EKE) [1, 2] allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secre...
Sarvar Patel
ECCV
1998
Springer
14 years 11 months ago
Study of Dynamical Processes with Tensor-Based Spatiotemporal Image Processing Techniques
Abstract. Image sequence processing techniques are used to study exchange, growth, and transport processes and to tackle key questions in environmental physics and biology. These a...
Bernd Jähne, Horst W. Haussecker, Hanno Schar...
WWW
2005
ACM
14 years 10 months ago
WebRogue: virtual presence in web sites
WebRogue is an application for virtual presence over the Web. It provides the Web Browser with a chat subwindow that allows users connected to the same Web site to meet, share opi...
Alessandro Soro, Ivan Marcialis, Davide Carboni, G...