Sciweavers

255 search results - page 11 / 51
» Principles for Entity Authentication
Sort
View
CTRSA
2008
Springer
113views Cryptology» more  CTRSA 2008»
13 years 9 months ago
Aggregate Message Authentication Codes
We propose and investigate the notion of aggregate message authentication codes (MACs) which have the property that multiple MAC tags, computed by (possibly) different senders on ...
Jonathan Katz, Andrew Y. Lindell
PDPTA
2000
13 years 8 months ago
Using Enterprise JavaBeans in a Computer Science Curriculum
This paper introduces the principles behind Enterprise JavaBeans including examples of both session and entity beans. It also discusses techniques for incorporating Enterprise Jav...
Rodney S. Tosten, Jeannie R. Albrecht, Christyann ...
SEMWEB
2010
Springer
13 years 5 months ago
Using Semantics for Automating the Authentication of Web APIs
Recent technology developments in the area of services on the Web are marked by the proliferation of Web applications and APIs. The implementation and evolution of applications bas...
Maria Maleshkova, Carlos Pedrinaci, John Domingue,...
SOUPS
2009
ACM
14 years 1 months ago
Conditioned-safe ceremonies and a user study of an application to web authentication
We introduce the notion of a conditioned-safe ceremony. A “ceremony” is similar to the conventional notion of a protocol, except that a ceremony explicitly includes human part...
Chris Karlof, J. D. Tygar, David Wagner
GRID
2007
Springer
13 years 11 months ago
Global-scale peer-to-peer file services with DFS
The global inter-networking infrastructure that has become essential for contemporary day-to-day computing and communication tasks, has also enabled the deployment of several large...
Antony Chazapis, Georgios Tsoukalas, Georgios Veri...