Sciweavers

648 search results - page 15 / 130
» The GCHQ Protocol and Its Problems
Sort
View
ICCBR
2005
Springer
14 years 2 months ago
Language Games: Solving the Vocabulary Problem in Multi-Case-Base Reasoning
The problem of heterogeneous case representation poses a major obstacle to realising real-life multi-case-base reasoning (MCBR) systems. The knowledge overhead in developing and ma...
Paolo Avesani, Conor Hayes, Marco Cova
ECAI
2004
Springer
14 years 2 months ago
Improving Asynchronous Backtracking for Dealing with Complex Local Problems
Distributed constraint satisfaction, in its most general acceptation, involves a collection of agents solving local constraint satisfaction subproblems, and a communication protoco...
Arnold Maestre, Christian Bessière
IWSEC
2007
Springer
14 years 2 months ago
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol
At Indocrypt 2005, Viet et al., [22] have proposed an anonymous password-authenticated key exchange (PAKE) protocol and its threshold construction both of which are designed for cl...
SeongHan Shin, Kazukuni Kobara, Hideki Imai
RFIDSEC
2010
13 years 7 months ago
Optimal Security Limits of RFID Distance Bounding Protocols
Abstract. In this paper, we classify the RFID distance bounding protocols having bitwise fast phases and no final signature. We also give the theoretical security bounds for two s...
Orhun Kara, Süleyman Kardas, Muhammed Ali Bin...
PERCOM
2005
ACM
14 years 8 months ago
Accessing Ubiquitous Services Using Smart Phones
The integration of Bluetooth service discovery protocol (SDP), and GPRS internet connectivity into phones provides a simple yet powerful infrastructure for accessing services in n...
Nishkam Ravi, Peter Stern, Niket Desai, Liviu Ifto...