Sciweavers

1834 search results - page 276 / 367
» Public Key Cryptography
Sort
View
HICSS
2007
IEEE
99views Biometrics» more  HICSS 2007»
14 years 2 months ago
Examining the Impacts of Institutional Framework on E-Government Infrastructures: A Study of Hong Kong Experiences
Since the Hong Kong SAR Government promulgated the first Digital 21 IT Strategy in November 1998, multiple major initiatives had been launched to establish the underlying infrastr...
Chun Yu, Paul Jen-Hwa Hu
ICIW
2007
IEEE
14 years 2 months ago
A New Security Scheme for Integration of Mobile Agents and Web Services
Web services specification provides an open standard for the distributed service oriented architecture. It is widely used in Internet and pervasive networks supporting wireless m...
Junqi Zhang, Yan Wang 0002, Vijay Varadharajan
SOCA
2007
IEEE
14 years 2 months ago
Mobile Agent and Web Service Integration Security Architecture
Mobile agent technology and Web Service technology compensate each other and play very important roles in eservice applications. The mechanism of Web Services technology naturally...
Junqi Zhang, Yan Wang 0002, Vijay Varadharajan
ACISP
2007
Springer
14 years 2 months ago
Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions
We present a new non-interactive message authentication protocol in manual channel model (NIMAP, for short) using the weakest assumption on the manual channel (i.e. assuming the st...
Mohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh...
COMSWARE
2006
IEEE
14 years 1 months ago
Trust-propagation based authentication protocol in multihop wireless home networks
Abstract— In this paper, we propose an authentication and secure channel establishment protocol that is reliable and adaptable for multihop wireless home networks. The main idea ...
Han Sang Kim, Jin Wook Lee, Sandeep K. S. Gupta, Y...