Sciweavers

609 search results - page 99 / 122
» One-Time-Password-Authenticated Key Exchange
Sort
View
COMPSAC
2009
IEEE
13 years 11 months ago
Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks
Delay and disruption tolerant networks (DTNs) can bring much-needed networking capabilities to developing countries and rural areas. DTN features such as high node mobility and in...
Karim M. El Defrawy, John Solis, Gene Tsudik
CNSR
2010
IEEE
145views Communications» more  CNSR 2010»
13 years 11 months ago
Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks
We address security solutions to protect the communication of the wireless components of a home health care system. We analyze especially the problem of exchanging secrets to sati...
Wiem Tounsi, Joaquín García-Alfaro, ...
ATAL
2006
Springer
13 years 11 months ago
Trust and honour in information-based agency
An argumentation based negotiation model is supported by information theory. Argumentative dialogues change the models of agents with respect to ongoing relationships between them...
Carles Sierra, John K. Debenham
CANS
2006
Springer
83views Cryptology» more  CANS 2006»
13 years 11 months ago
Efficient Mutual Data Authentication Using Manually Authenticated Strings
Abstract. Solutions for an easy and secure setup of a wireless connection between two devices are urgently needed for WLAN, Wireless USB, Bluetooth and similar standards for short ...
Sven Laur, Kaisa Nyberg
FC
2006
Springer
99views Cryptology» more  FC 2006»
13 years 11 months ago
A Protocol for Secure Public Instant Messaging
Although Instant Messaging (IM) services are now relatively long-standing and very popular as an instant way of communication over the Internet, they have received little attention...
Mohammad Mannan, Paul C. van Oorschot