Sciweavers

1490 search results - page 230 / 298
» The Logic of Authentication Protocols
Sort
View
162
Voted
ACSAC
2000
IEEE
15 years 8 months ago
Applications in Health Care using Public-Key Certificates and Attribute Certificates
Security infrastructures are increasingly used in the health care and welfare sector, particularly for providing security, like confidentiality, authenticity, integrity, nonrepudi...
Petra Wohlmacher, Peter Pharow
123
Voted
IADIS
2004
15 years 5 months ago
Access Management in Federated Digital Libraries
With the growth in digital libraries and standardization of protocols for metadata sharing, it is becoming feasible to build federated discovery services which aggregate metadata ...
Kailash Bhoopalam, Kurt Maly, Mohammad Zubair, Rav...
175
Voted
SEC
2003
15 years 5 months ago
Providing Voice Privacy Over Public Switched Telephone Networks
: The public telephone network has been evolving from manually switched wires carrying analog encoded voice of the 19th century to an automatically switched grid of copper-wired, f...
Mohamed Sharif, Duminda Wijesekera
168
Voted
ICN
2009
Springer
15 years 8 months ago
New Algorithm for the Design of Topology Aware Hypercube in Multi-hop Ad Hoc Networks
Securing group communications in resource constrained, infrastructure-less environments such as Mobile Ad Hoc Networks (MANETs) has become one of the most challenging research dire...
Maria Striki, Kyriakos Manousakis, John S. Baras
145
Voted
IPPS
2005
IEEE
15 years 9 months ago
IPSec Implementation on Xilinx Virtex-II Pro FPGA and Its Application
In this paper, we propose an IPSec implementation on Xilinx Virtex-II Pro FPGA1 . We move the key management and negotiation into software function calls that run on the PowerPC p...
Jing Lu, John W. Lockwood