Sciweavers

1490 search results - page 203 / 298
» The Logic of Authentication Protocols
Sort
View
ICIP
1998
IEEE
14 years 10 months ago
A Web-based Secure System for the Distributed Printing of Documents and Images
We propose and consider a secure printing system for the distributed printing of documents and images over the World Wide Web. This system enables secure sharing, commerce, and co...
Ping Wah Wong, Daniel Tretter, Thomas Kite, Qian L...
CNSR
2008
IEEE
214views Communications» more  CNSR 2008»
14 years 3 months ago
HGKM: A Group-Based Key Management Scheme for Sensor Networks Using Deployment Knowledge
Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of t...
Ngo Trong Canh, Young-Koo Lee, Sungyoung Lee
GLOBECOM
2008
IEEE
14 years 3 months ago
Diameter WebAuth: An AAA-Based Identity Management Framework for Web Applications
Abstract—With an increasing number of personalized information and services offered on the Internet, especially the World Wide Web, effective identity management solutions are de...
Niklas Neumann, Xiaoming Fu
RECONFIG
2008
IEEE
156views VLSI» more  RECONFIG 2008»
14 years 3 months ago
Forward-Secure Content Distribution to Reconfigurable Hardware
Confidentiality and integrity of bitstreams and authenticated update of FPGA configurations are fundamental to trusted computing on reconfigurable technology. In this paper, we pr...
David Champagne, Reouven Elbaz, Catherine H. Gebot...
WIMOB
2008
IEEE
14 years 3 months ago
Securing Dynamic Home Agent Address Discovery with Cryptographically Generated Addresses and RSA Signatures
With Dynamic Home Agent Address Discovery (DHAAD), as specified in Mobile IPv6, a Mobile Node can discover the address of a suitable Home Agent on the home link. However, DHAAD suf...
Christian Bauer, Max Ehammer