Sciweavers

293 search results - page 10 / 59
» User Interface Requirements for Authentication of Communicat...
Sort
View
IJNSEC
2006
78views more  IJNSEC 2006»
13 years 7 months ago
Authentication and Key Agreement Protocols Preserving Anonymity
Anonymity is a very important security feature in addition to authentication and key agreement features in communication protocols. In this paper, we propose two authentication an...
Kumar V. Mangipudi, Rajendra S. Katti, Huirong Fu
ECWEB
2003
Springer
114views ECommerce» more  ECWEB 2003»
14 years 23 days ago
Enhancing E-commerce Security Using GSM Authentication
Abstract. Today, e-commerce transactions are typically protected using SSL/TLS. However, there are risks in such use of SSL/TLS, notably threats arising from the fact that informat...
Vorapranee Khu-smith, Chris J. Mitchell
ICC
2007
IEEE
136views Communications» more  ICC 2007»
13 years 11 months ago
SAMcast - A Scalable, Secure and Authenticated Multicast Protocol for Large Scale P2P Networks
Overlay networks have shown tremendous potential in solving large scale data dissemination problem by employing peer-to-peer communication protocols. These networks, however, have ...
Waseem Ahmad, Ashfaq A. Khokhar
KBSE
2000
IEEE
13 years 12 months ago
A Comparison of Questionnaire-Based and GUI-Based Requirements Gathering
: Software development includes gathering information about tasks, work practices and design options from users. Traditionally requirements gathering takes two forms. Interviews an...
J. Michael Moore, Frank M. Shipman III
ICC
2009
IEEE
132views Communications» more  ICC 2009»
14 years 2 months ago
A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity
—A key agreement protocol is a protocol whereby two or more communicating parties can agree on a key or exchange information over an open communication network in such a way that...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang