Sciweavers

610 search results - page 52 / 122
» Predicate-Based Key Exchange
Sort
View
SP
1997
IEEE
139views Security Privacy» more  SP 1997»
14 years 10 days ago
Number Theoretic Attacks on Secure Password Schemes
Encrypted Key Exchange (EKE) [1, 2] allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secre...
Sarvar Patel
CEC
2009
IEEE
13 years 6 months ago
Open-ended on-board Evolutionary Robotics for robot swarms
The SYMBRION project stands at the crossroads of Artificial Life and Evolutionary Robotics: a swarm of real robots undergoes online evolution by exchanging information in a decentr...
G. Baele, Nicolas Bredeche, Evert Haasdijk, Steven...
ICEBE
2009
IEEE
136views Business» more  ICEBE 2009»
13 years 6 months ago
Virtual Wealth Realization in Virtual and Real Worlds
This paper has investigated the issue of virtual wealth and its realization in both real and virtual worlds, and argued that the realization of virtual wealth is necessary and pos...
Jingzhi Guo, Angelina Chow, Zhiguo Gong, Chengzhen...
BRAIN
2010
Springer
13 years 5 months ago
Domain-Specific Modeling as a Pragmatic Approach to Neuronal Model Descriptions
Biologically realistic modeling has been greatly facilitated by the development of neuro-simulators, and the development of simulatorindependent formats for model exchange is the s...
Ralf Ansorg, Lars Schwabe

Publication
117views
13 years 5 months ago
Design, Implementation, and Performance Analysis of DiscoSec–Service Pack for Securing WLANs
To improve the already tarnished reputation of WLAN security, the new IEEE 802.11i security standard provides means for an enhanced user authentication and strong data confidential...
Ivan Martinovic, Paul Pichota, Matthias Wilhelm, F...