Sciweavers

255 search results - page 26 / 51
» Principles for Entity Authentication
Sort
View
WCNC
2010
IEEE
14 years 12 days ago
Global Grassroots WiFi Sharing
— Access point sharing communities are an attractive solution for low-cost global mobile Internet access. However, existing communities all require a central authority in form of...
Wolfgang Kieß, Till Elsner, Björn Scheu...
ACSAC
2001
IEEE
14 years 5 days ago
Secure Anonymous Group Infrastructure for Common and Future Internet Applications
Secure group communication protocols, in particular multi-party key agreement and update algorithms, help promote traditional and new Internet multi-party applications such as vid...
Nathalie Weiler
DOA
2000
159views more  DOA 2000»
13 years 10 months ago
Mobile Code as an Enabling Technology for Service-Oriented Smartcard Middleware
Smartcards can be seen as service providing entities that implement a secure, tamper-proof storage and offer computational resources which make them ideally suited for a variety o...
Roger Kehr, Michael Rohs, Harald Vogt
CCS
2010
ACM
13 years 6 months ago
Developing security protocols by refinement
We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides sformation of abstract security goals into protocols that are s...
Christoph Sprenger, David A. Basin
SRDS
2010
IEEE
13 years 6 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...