Sciweavers

609 search results - page 92 / 122
» One-Time-Password-Authenticated Key Exchange
Sort
View
IJMSO
2008
135views more  IJMSO 2008»
13 years 7 months ago
An argumentation framework based on confidence degrees to combine ontology mapping approaches
: Ontology mapping has a key importance for applications such as information retrieval, database integration, and agent-communication. This paper presents an Argumentation Framewor...
Cássia Trojahn dos Santos, Paulo Quaresma, ...
JUCS
2010
167views more  JUCS 2010»
13 years 6 months ago
Ontology based Approach in Knowledge Sharing Measurement
: For many years, physical asset indicators were the main evidence of an organization’s successful performance. However, the situation has changed following the revolution of inf...
Behrang Zadjabbari, Pornpit Wongthongtham, Farookh...
MASS
2010
156views Communications» more  MASS 2010»
13 years 5 months ago
On application of Host Identity Protocol in wireless sensor networks
Recent advances in development of low-cost wireless sensor platforms open up opportunities for novel wireless sensor network (WSN) applications. Likewise emerge security concerns o...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov
IACR
2011
221views more  IACR 2011»
12 years 7 months ago
A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
Abstract. Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purpose...
Süleyman Kardas, Mehmet Sabir Kiraz, Muhammed...
ECTEL
2008
Springer
13 years 9 months ago
A Supporting Architecture for Generic Service Integration in IMS Learning Design
Abstract. Learning Design offers the possibility of capturing the process, activities, user organization and resources used in a learning experience. But a wider set of scenarios a...
Luis de la Fuente Valentín, Yongwu Miao, Ab...