Sciweavers

98 search results - page 3 / 20
» Risks of the CardSpace Protocol
Sort
View
ASIAN
2007
Springer
96views Algorithms» more  ASIAN 2007»
14 years 1 months ago
Risk Balance in Exchange Protocols
Muhammad Torabi Dashti, Yanjing Wang
ECOOPW
1998
Springer
13 years 11 months ago
Secure Recording of Itineraries through Co-operating Agents
Security is a fundamental precondition for the acceptance of mobile agent systems. In this paper we discuss protocols to improve agent security by distributing critical data and o...
Volker Roth
CORR
2010
Springer
159views Education» more  CORR 2010»
13 years 7 months ago
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags
Radio Frequency Identification (RFID) technology one of the most promising technologies in the field of ubiquitous computing. Indeed, RFID technology may well replace barcode tech...
Eslam Gamal Ahmed, Eman Shaaban, Mohamed Hashem
COMCOM
2007
83views more  COMCOM 2007»
13 years 7 months ago
Improving authentication of remote card transactions with mobile personal trusted devices
Credit card transactions are a popular and diffused means of payment over the network. Unfortunately, current technology does not allow us to technically solve disputes that may ...
Andrea Bottoni, Gianluca Dini
IJNSEC
2008
164views more  IJNSEC 2008»
13 years 7 months ago
Secure Real-Time Streaming Protocol (RTSP) for Hierarchical Proxy Caching
Proxies are commonly used to cache objects, especially multimedia objects, so that clients can enjoy better quality-of-service (QoS) guarantees such as smaller startup latency and...
Yeung Siu Fung, John C. S. Lui, David K. Y. Yau