Sciweavers

1834 search results - page 145 / 367
» Public Key Cryptography
Sort
View
DCC
2005
IEEE
14 years 9 months ago
Signcryption with Non-interactive Non-repudiation
Signcryption [35] is a public key primitive that achieves the functionality of both an encryption scheme and a signature scheme simultaneously. It does this more efficiently than a...
John Malone-Lee
ISCC
2008
IEEE
143views Communications» more  ISCC 2008»
14 years 4 months ago
SSMS - A secure SMS messaging protocol for the m-payment systems
The GSM network with the greatest worldwide number of users, succumbs to several security vulnerabilities. The Short Message Service (SMS) is one of its superior and well-tried se...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
PERVASIVE
2006
Springer
13 years 9 months ago
Secure Mobile Computing Via Public Terminals
The rich interaction capabilities of public terminals can make them more convenient to use than small personal devices, such as smart phones. However, the use of public terminals t...
Richard Sharp, James Scott, Alastair R. Beresford
HICSS
2005
IEEE
153views Biometrics» more  HICSS 2005»
14 years 3 months ago
SOTIP as a Model for Outsourcing of Telecom Services for the Public Sector
The political intentions for the past 20 years have broadly speaking been to reduce the number of publicly owned and publicly run activities. Outsourcing is an often applied way t...
Helena Lindskog
IH
2001
Springer
14 years 2 months ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu