Sciweavers

EUC
2008
Springer
13 years 10 months ago
Efficient Client-to-Client Password Authenticated Key Exchange
With the rapid proliferation of client-to-client applications, PAKE (password authenticated key exchange) protocols in the client-to-client setting become increasingly important. ...
Yanjiang Yang, Feng Bao, Robert H. Deng
EUC
2008
Springer
13 years 10 months ago
An Improved Password-Based Authenticated Key Agreement Scheme for Pervasive Applications
Password authentication is a popular approach used for user authentication in pervasive computing environments due to its simplicity and convenience. To secure the transmission be...
Maw-Jinn Tsaur, Wei-Chi Ku, Hao-Rung Chung
EUC
2008
Springer
13 years 10 months ago
Communications via Systems-on-Chips Clustering in Large-Scaled Sensor Networks
In this paper, we have proposed a framework of systems-on-chips clustering in application to complicated sensor networks. The framework can be applied to address the communication ...
Sharon Fan, Jeffrey Fan, Kia Makki, Niki Pissinou
EUC
2008
Springer
13 years 10 months ago
A Sanitizing Signature Scheme with Indexing
Atsushi Koide, Raylin Tso, Eiji Okamoto
EUC
2008
Springer
13 years 10 months ago
Reducing Context Switch Overhead with Compiler-Assisted Threading
Multithreading is an important software modularization technique. However, it can incur substantial overheads, especially in processors where the amount of architecturally visible...
Pekka Jääskeläinen, Pertti Kellom&a...
EUC
2008
Springer
13 years 10 months ago
Access Control in Ubiquitous Environments Based on Subjectivity Eliminated Trust Propagation
The first challenge that we tackle in this paper is how to conduct access control in ubiquitous environments where sites have to handle access requests from their own users as wel...
Omar Hasan, Jean-Marc Pierson, Lionel Brunie
EUC
2008
Springer
13 years 10 months ago
Analyzing Privacy Designs of Mobile Social Networking Applications
The combined advances of open mobile platforms and online social networking applications (SNAs) are driving pervasive computing to the real-world users, as the mobile SNAs are exp...
Guanling Chen, Faruq Rahman
EUC
2008
Springer
13 years 10 months ago
Property Verification for Generic Access Control Models
Vincent C. Hu, D. Richard Kuhn, Tao Xie
EUC
2008
Springer
13 years 10 months ago
Data Mining for Security Applications
Bhavani M. Thuraisingham, Latifur Khan, Mohammad M...