Sciweavers

1229 search results - page 203 / 246
» Trusted Computing
Sort
View
NBIS
2009
Springer
14 years 2 months ago
Improving the Robustness of Wireless Device Pairing Using Hyphen-Delimited Numeric Comparison
Abstract—The operation of achieving authenticated key agreement between two human-operated mobile devices over a short range wireless communication channel, such as Bluetooth or ...
Ambarish Karole, Nitesh Saxena
ICQNM
2008
IEEE
201views Chemistry» more  ICQNM 2008»
14 years 2 months ago
Loss-Tolerant Quantum Coin Flipping
Coin flipping is a cryptographic primitive in which two spatially separated players, who in principle do not trust each other, wish to establish a common random bit. If we limit ...
Guido Berlín, Gilles Brassard, Félix...
ICC
2007
IEEE
114views Communications» more  ICC 2007»
14 years 2 months ago
Two-Factor Localized Authentication Scheme for WLAN Roaming
- In the paper, we propose an efficient two-factor localized authentication scheme suitable for WLAN roaming. The proposed authentication scheme can greatly improve the security co...
Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen
ATAL
2007
Springer
14 years 1 months ago
An equal excess negotiation algorithm for coalition formation
Coalition formation is an important form of interaction in multiagent systems. It enables the agents to satisfy tasks that they would otherwise be unable to perform, or would perf...
Hrishikesh J. Goradia, José M. Vidal
CIS
2007
Springer
14 years 1 months ago
Controlled Secret Leakage
— Privacy is the claim of individuals, groups and institutions to determine for themselves, when, how and to what extent information about them is communicated to others. How to ...
Tianjie Cao, Shi Huang, Hui Cui, Yipeng Wu, Qihan ...