Sciweavers

34 search results - page 1 / 7
» The Security Twin Peaks
Sort
View
ESSOS
2011
Springer
12 years 8 months ago
The Security Twin Peaks
The feedback from architectural decisions to the elaboration of requirements is an established concept in the software engineering community. However, pinpointing the nature of thi...
Thomas Heyman, Koen Yskout, Riccardo Scandariato, ...
JOCN
2006
90views more  JOCN 2006»
13 years 4 months ago
Twin Peaks: An ERP Study of Action Planning and Control in Coacting Individuals
Natalie Sebanz, Günther Knoblich, Wolfgang Pr...
CCS
2001
ACM
13 years 9 months ago
Twin signatures: an alternative to the hash-and-sign paradigm
David Naccache, David Pointcheval, Jacques Stern
CMS
2011
229views Communications» more  CMS 2011»
12 years 4 months ago
Twin Clouds: Secure Cloud Computing with Low Latency - (Full Version)
Abstract. Cloud computing promises a cost effective enabling technology to outsource storage and massively parallel computations. However, existing approaches for provably secure ...
Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sa...
CCS
2009
ACM
14 years 5 months ago
An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem
In this paper, we present a new ID-based two-party authenticated key exchange (AKE) protocol, which makes use of a new technique called twin Diffie-Hellman problem proposed by Cas...
Hai Huang, Zhenfu Cao