Sciweavers

IJISEC
2007
61views more  IJISEC 2007»
13 years 4 months ago
Identity-based key agreement protocols from pairings
In recent years, a large number of identity-based key agreement protocols from pairings have been proposed. Some of them are elegant and practical. However, the security of this ty...
Liqun Chen, Zhaohui Cheng, Nigel P. Smart
CORR
2006
Springer
67views Education» more  CORR 2006»
13 years 4 months ago
Considering users' behaviours in improving the responses of an information base
: In this paper, our aim is to propose a model that helps in the efficient use of an information system by users, within the organization represented by the IS, in order to resolve...
Babajide Afolabi, Odile Thiery