Sciweavers

403 search results - page 25 / 81
» Secure Protocols with Asymmetric Trust
Sort
View
ISCC
2007
IEEE
14 years 2 months ago
Gaining Flexibility by Security Protocol Transfer
Even though PDAs in general—but smartcards in particular—can be trusted to keep secrets, because they have meager resources, including them in security protocols is difficult...
Per Harald Myrvang, Tage Stabell-Kulø
CSIE
2009
IEEE
14 years 3 months ago
An Enhanced-Security Fair E-payment Protocol
Customers are usually passive in an electronic commerce transaction. Based on a new two times concurrent signature, this article presents a fair electronic payment (E-payment) pro...
Wei Fan, Huaying Shu, Elizabeth Fife, Qiang Yan
DEXAW
2006
IEEE
188views Database» more  DEXAW 2006»
14 years 2 months ago
A Protocol for Secure Content Distribution in Pure P2P Networks
A significant challenge for Peer-to-Peer (P2P) systems is maintaining the correctness and consistency of their global data structures and shared contents as peers independently a...
Esther Palomar, Juan M. Estévez-Tapiador, J...
CCS
2006
ACM
14 years 5 days ago
Securing the drop-box architecture for assisted living
Home medical devices enable individuals to monitor some of their own health information without the need for visits by nurses or trips to medical facilities. This enables more con...
Michael J. May, Wook Shin, Carl A. Gunter, Insup L...
ICIAP
2005
ACM
14 years 8 months ago
Asymmetric 3D/2D Processing: A Novel Approach for Face Recognition
Facial image analysis is very useful in many applications such as video compression, talking heads, or biometrics. During the last few years, many algorithms have been proposed in ...
Daniel Riccio, Jean-Luc Dugelay