Sciweavers

50 search results - page 3 / 10
» aina 2004
Sort
View
AINA
2004
IEEE
13 years 9 months ago
Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking
IEEE 802.1x and authentication server based security protocols are mainly used for enhancing security of wireless networks. In this paper, we specify PAP and EAP-MD5 based securit...
Il-Gon Kim, Jin-Young Choi
AINA
2004
IEEE
13 years 9 months ago
An Identity-based Ring Signature Scheme from Bilinear Pairings
At the conference Asiacrypt 2001, Rivest, Shamir and Tauman firstly addressed the concept of ring signature. In this paper we propose an identity-based ring signature scheme from ...
Chih-Yin Lin, Tzong-Chen Wu
AINA
2004
IEEE
13 years 9 months ago
Using the Extension Function of XSLT and DSL to Secure XML Documents
XSLT is a very popular and flexible language for transforming XML documents which provides a powerful implementation of a tree-oriented transformation language for transmuting ins...
Tao-Ku Chang, Gwan-Hwan Hwang
AINA
2004
IEEE
13 years 9 months ago
Designing a Mobile Phone of the Future: Requirements Elicitation using Photo Essays and Scenarios
We report a case study of designing a mobile phone of the future, involving participatory requirements elicitation using a form of scenario-based design. Participants took photogr...
Kentaro Go, Yasuaki Takamoto, John M. Carroll
AINA
2004
IEEE
13 years 9 months ago
Peer-To-Peer Technology for Interconnecting Web Services in Heterogeneous Networks
The interconnection of software components is a key to enabling collaborative work. However, technology differences and security barriers like firewalls often hinder establishing ...
Tim Schattkowsky, Christoph Loeser, Wolfgang M&uum...