Sciweavers

610 search results - page 29 / 122
» Predicate-Based Key Exchange
Sort
View
ACISP
2005
Springer
14 years 1 months ago
Analysis of the HIP Base Exchange Protocol
Abstract The Host Identity Protocol (HIP) is an Internet security and multiaddressing mechanism specified by the IETF. HIP introduces a new layer between the transport and network ...
Tuomas Aura, Aarthi Nagarajan, Andrei Gurtov
IFIP12
2004
13 years 9 months ago
Using Agents in the Exchange of Product Data
: This paper describes using agents in the exchange of industrial product data when predefined translators are not available. A major problem with standard translators is that a se...
Udo Kannengiesser, John S. Gero
ER
2006
Springer
132views Database» more  ER 2006»
13 years 11 months ago
Schema-Mediated Exchange of Temporal XML Data
When web servers publish data formatted in XML, only the current state of the data is (generally) published. But data evolves over time as it is updated. Capturing that evolution i...
Curtis E. Dyreson, Richard T. Snodgrass, Faiz Curr...
IJNSEC
2006
110views more  IJNSEC 2006»
13 years 7 months ago
The Improvement of YSYCT Scheme for Imbalanced Wireless Network
Recently, Yeh et al. proposed an improved password authenticated key exchange scheme (YSYCT scheme) which is secure against undetectable on-line password guessing attacks and prov...
Jung-Wen Lo
CSL
2007
Springer
14 years 1 months ago
Tightening the Exchange Rates Between Automata
Automata on infinite objects were the key to the solution of several fundamental decision problems in mathematics and logic. Today, automata on infinite objects are used for form...
Orna Kupferman