Sciweavers

1834 search results - page 142 / 367
» Public Key Cryptography
Sort
View
SIGOPS
2002
88views more  SIGOPS 2002»
13 years 9 months ago
A pragmatic alternative to undetachable signatures
A `pragmatic' alternative to undetachable signatures is proposed. Undetachable signatures were introduced by Sander and Tschudin, [4], as a means of giving a mobile agent the...
Niklas Borselius, Chris J. Mitchell, Aaron Wilson
FC
2006
Springer
99views Cryptology» more  FC 2006»
14 years 1 months ago
A Protocol for Secure Public Instant Messaging
Although Instant Messaging (IM) services are now relatively long-standing and very popular as an instant way of communication over the Internet, they have received little attention...
Mohammad Mannan, Paul C. van Oorschot
HICSS
2012
IEEE
322views Biometrics» more  HICSS 2012»
12 years 5 months ago
Exploring the Motive for Data Publication in Open Data Initiative: Linking Intention to Action
This research study was designed to broaden understanding of the publishing of research datasets by distinguishing between the intention to share and the action of sharing. The da...
Djoko Sigit Sayogo, Theresa A. Pardo
CORR
2010
Springer
100views Education» more  CORR 2010»
13 years 8 months ago
Secret Key Generation for a Pairwise Independent Network Model
Abstract— We investigate secret key generation for a “pairwise independent network” model in which every pair of terminals observes correlated sources which are independent o...
Sirin Nitinawarat, Chunxuan Ye, Alexander Barg, Pr...
AISM
2004
13 years 11 months ago
PKI - Advantages and Obstacles
Electronic communications have become the most important kind of communications in business. However, trust, privacy and security have become the great challenges for business and...
A. Jancic, Matthew J. Warren