Sciweavers

255 search results - page 5 / 51
» Principles for Entity Authentication
Sort
View
JCP
2007
103views more  JCP 2007»
13 years 7 months ago
Conformance Testing a Set of Criteria for Assessing Trust
—The ability to authenticate the identity of an entity in an open and insecure environment such as the Internet plays an important role in reducing potential threats and Public k...
Omar Batarfi, Lindsay Marshall
EUSFLAT
2009
173views Fuzzy Logic» more  EUSFLAT 2009»
13 years 5 months ago
Application of Zadeh's Impossibility Principle to Approximate Explanation
Abstract: We consider application of Zadeh's impossibility principle and extended logic FLe to approximate scientific explanation from the standpoint of the philosophy of scie...
Vesa A. Niskanen
TC
2010
13 years 5 months ago
Authenticated Group Key Transfer Protocol Based on Secret Sharing
—Key transfer protocols rely on a mutually trusted key generation center (KGC) to select session keys and transport session keys to all communication entities secretly. Most ofte...
Lein Harn, Changlu Lin
COCOON
2010
Springer
14 years 5 days ago
Identity-Based Authenticated Asymmetric Group Key Agreement Protocol
In identity-based public-key cryptography, an entity’s public key can be easily derived from its identity. The direct derivation of public keys in identity-based public-key crypt...
Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferr...
VISSOFT
2005
IEEE
14 years 29 days ago
Fractal Figures: Visualizing Development Effort for CVS Entities
Versioning systems such as CVS or Subversion exhibit a large potential to investigate the evolution of software systems. They are used to record the development steps of software ...
Marco D'Ambros, Michele Lanza, Harald Gall