Sciweavers

12 search results - page 2 / 3
» Gaining Flexibility by Security Protocol Transfer
Sort
View
ICNSC
2007
IEEE
13 years 11 months ago
A New Anti-Spam Protocol Using CAPTCHA
— Today sending spams has turned to be a major problem in the Internet. It is so serious that more than 80% of the transferred emails are spams. As a result, various methods have...
Sajad Shirali-Shahreza, Ali Movaghar
ACSAC
1999
IEEE
13 years 9 months ago
Secure Communications in ATM Networks
The ATM Forum international consortium recently approved the first version of its security specifications aiming to protect communications over Asynchronous Transfer Mode (ATM) ne...
Maryline Laurent, Ahmed Bouabdallah, Christophe De...
PKC
2010
Springer
148views Cryptology» more  PKC 2010»
13 years 9 months ago
On the Feasibility of Consistent Computations
In many practical settings, participants are willing to deviate from the protocol only if they remain undetected. Aumann and Lindell introduced a concept of covert adversaries to f...
Sven Laur, Helger Lipmaa
EJWCN
2010
118views more  EJWCN 2010»
13 years 9 days ago
Controlled Delegation Protocol in Mobile RFID Networks
To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is t...
Ming-Hour Yang
BPM
2005
Springer
173views Business» more  BPM 2005»
13 years 11 months ago
Semi-automatic Generation of Web Services and BPEL Processes - A Model-Driven Approach
With the advent of Web services and orchestration specifications like BPEL it is possible to define workflows on an Internet-scale. In the health-care domain highly structured and ...
Rainer Anzböck, Schahram Dustdar