Sciweavers

308 search results - page 19 / 62
» A New Model for Public-Key Authentication
Sort
View
DCOSS
2006
Springer
15 years 3 months ago
Distributed User Access Control in Sensor Networks
User access control in sensor networks defines a process of granting user the access right to the information and resources. It is essential for the future real sensor network depl...
Haodong Wang, Qun Li
ESORICS
2010
Springer
15 years 28 days ago
Readers Behaving Badly - Reader Revocation in PKI-Based RFID Systems
Abstract. Recent emergence of RFID tags capable of performing public key operations motivates new RFID applications, including electronic travel documents, identification cards and...
Rishab Nithyanand, Gene Tsudik, Ersin Uzun
TC
2008
14 years 11 months ago
Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices
In an attempt to expand Public Key Infrastructure (PKI) usage to a ubiquitous and mobile computing environment, we found that the deployment of the PKI on a resource-constrained de...
Ki-Woong Park, Sang Seok Lim, Kyu Ho Park
ICCSA
2007
Springer
15 years 3 months ago
Estimation of TTP Features in Non-repudiation Service
In order to achieve a high performance in a real implementation of the non-repudiation service it is necessary to estimate timeouts, TTP features, publication key time, number of o...
Mildrey Carbonell, José María Sierra...
USITS
1997
15 years 1 months ago
Lightweight Security Primitives for E-Commerce
Emerging applications in electronic commerce often involve very low-cost transactions, which execute in the context of ongoing, extended clientserver relationships. For example, c...
Yossi Matias, Alain J. Mayer, Abraham Silberschatz