Sciweavers

632 search results - page 18 / 127
» Two Facets of Authentication
Sort
View
CSFW
2005
IEEE
14 years 3 months ago
An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols
Authentication and secrecy properties are proved by very different methods: the former by local reasoning, leading to matching knowledge of all principals about the order of their...
Iliano Cervesato, Catherine Meadows, Dusko Pavlovi...
ACNS
2004
Springer
104views Cryptology» more  ACNS 2004»
14 years 3 months ago
Key Agreement Using Statically Keyed Authenticators
A family of authenticators based on static shared keys is identified and proven secure. The authenticators can be used in a variety of settings, including identity-based ones. App...
Colin Boyd, Wenbo Mao, Kenneth G. Paterson
ISW
2001
Springer
14 years 2 months ago
Persistent Authenticated Dictionaries and Their Applications
Abstract. We introduce the notion of persistent authenticated dictionaries, that is, dictionaries where the user can make queries of the type “was element e in set S at time t?...
Aris Anagnostopoulos, Michael T. Goodrich, Roberto...
WEBNET
2000
13 years 11 months ago
Electronic Portfolios in Assessment of Preservice Teachers
: Portfolios are valuable authentic assessment tools in preservice teacher education programs, as they allow for student demonstration of performance, interconnected tasks, respons...
Scott Walker
CHI
2010
ACM
14 years 4 months ago
FeedWinnower: layering structures over collections of information streams
Information overload is a growing threat to the productivity of today’s knowledge workers, who need to keep track of multiple streams of information from various sources. RSS fe...
Lichan Hong, Gregorio Convertino, Bongwon Suh, Ed ...