Sciweavers

1116 search results - page 141 / 224
» Secure Mediation: Requirements and Design
Sort
View
IJNSEC
2010
98views more  IJNSEC 2010»
13 years 4 months ago
A Random Bit Generator Using Chaotic Maps
Chaotic systems have many interesting features such as sensitivity on initial condition and system parameter, ergodicity and mixing properties. In this paper, we exploit these int...
Narendra K. Pareek, Vinod Patidar, Krishan K. Sud
SACMAT
2009
ACM
14 years 3 months ago
Ensuring spatio-temporal access control for real-world applications
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anas...
CTRSA
2010
Springer
191views Cryptology» more  CTRSA 2010»
14 years 18 days ago
Making the Diffie-Hellman Protocol Identity-Based
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [33]) each party uses its own identity as public key and rece...
Dario Fiore, Rosario Gennaro
ACMICEC
2008
ACM
195views ECommerce» more  ACMICEC 2008»
13 years 11 months ago
DRM domain authentication using electronic payment systems
This paper focuses on the problem of how to allow sharing of copyrighted content between a set of authorised devices and preventing unauthoried copying of content to other devices...
Imad M. Abbadi, Muntaha Alawneh
DATE
2007
IEEE
126views Hardware» more  DATE 2007»
14 years 3 months ago
The ARTEMIS cross-domain architecture for embedded systems
platform and a suite of abstract components with which new developments in different application domains can be engineered with minimal effort [1]p.16. Generic platforms, or refere...
Hermann Kopetz