Sciweavers

610 search results - page 110 / 122
» Predicate-Based Key Exchange
Sort
View
ISPASS
2005
IEEE
14 years 1 months ago
Anatomy and Performance of SSL Processing
A wide spectrum of e-commerce (B2B/B2C), banking, financial trading and other business applications require the exchange of data to be highly secure. The Secure Sockets Layer (SSL...
Li Zhao, Ravi R. Iyer, Srihari Makineni, Laxmi N. ...
EUROCRYPT
2005
Springer
14 years 1 months ago
Secure Remote Authentication Using Biometric Data
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are n...
Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafai...
WWW
2003
ACM
14 years 22 days ago
Experience With Teaching and Learning in Cooperative Knowledge Areas
Since the early 1990s, different infrastructures for supporting learning have been developed and practically tested in Paderborn. One of the key products of our research is the we...
Thorsten Hampel, Reinhard Keil-Slawik
HICSS
2002
IEEE
144views Biometrics» more  HICSS 2002»
14 years 13 days ago
Managing Long Term Communications: Conversation and Contact Management
Contact management is an important part of everyday work. People exchange business cards to try to enter each other’s contact lists. Local businesses provide refrigerator magnet...
Steve Whittaker, Quentin Jones, Loren G. Terveen
AGENTS
2001
Springer
13 years 12 months ago
Monitoring deployed agent teams
Recent years are seeing an increasing need for on-line monitoring of deployed distributed teams of cooperating agents, e.g., for visualization, or performance tracking. However, i...
Gal A. Kaminka, David V. Pynadath, Milind Tambe