Sciweavers

98 search results - page 8 / 20
» Risks of the CardSpace Protocol
Sort
View
BIRTHDAY
2012
Springer
12 years 3 months ago
Deniable RSA Signature - The Raise and Fall of Ali Baba
The 40 thieves realize that the fortune in their cave is vanishing. A rumor says that Ali Baba has been granted access (in the form of a certificate) to the cave but they need evi...
Serge Vaudenay
CRYPTO
2005
Springer
149views Cryptology» more  CRYPTO 2005»
14 years 1 months ago
Authenticating Pervasive Devices with Human Protocols
Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive computing devices. These devices lack the computational, storage, power, and communication r...
Ari Juels, Stephen A. Weis
CCS
2001
ACM
13 years 12 months ago
The faithfulness of abstract protocol analysis: message authentication
hfulness of Abstract Protocol Analysis: Message Authentication∗ Joshua D. Guttman F. Javier Thayer Lenore D. Zuck December 18, 2002 Dolev and Yao initiated an approach to studyi...
Joshua D. Guttman, F. Javier Thayer, Lenore D. Zuc...
ICRA
2002
IEEE
151views Robotics» more  ICRA 2002»
14 years 12 days ago
Protocols for Collaboration, Coordination and Dynamic Role Assignment in a Robot Team
—Creation of cooperative robot teams for complex tasks requires not only agents that can function well individually but also agents that can coordinate their actions. This paper ...
Rosemary Emery, Kevin Sikorski, Tucker R. Balch
BPM
2007
Springer
152views Business» more  BPM 2007»
13 years 11 months ago
Adaptive Workflows for Healthcare Information Systems
Current challenges in Healthcare Information Systems (HIS) include supplying patients with personalized medical information, creating means for efficient information flow between d...
Kees M. van Hee, Helen Schonenberg, Alexander Sere...