Sciweavers

252 search results - page 35 / 51
» Computationally secure two-round authenticated message excha...
Sort
View
MA
2000
Springer
135views Communications» more  MA 2000»
15 years 1 months ago
Principles of Mobile Maude
Mobile Maude is a mobile agent language extending the rewriting logic language Maude and supporting mobile computation. Mobile Maude uses reflection to obtain a simple and general ...
Francisco Durán, Steven Eker, Patrick Linco...
IWAN
2004
Springer
15 years 3 months ago
Secure, Customizable, Many-to-One Communication
Concast is a customizable many-to-one network-layer communication service. Although programmable services like concast can improve the efficiency of group applications, accompanyi...
Kenneth L. Calvert, Jim Griffioen, Billy Mullins, ...
ISCIS
2005
Springer
15 years 3 months ago
A Secure Communication Framework for Mobile Agents
Abstract. Communication, a fundamental concept in computing, allows two pieces of software to interact and to exchange information. It is an important aspect of mobile agent system...
Suat Ugurlu, Nadia Erdogan
FC
2010
Springer
205views Cryptology» more  FC 2010»
15 years 1 months ago
On Robust Key Agreement Based on Public Key Authentication
—This paper discusses public-key authenticated key agreement protocols. First, we critically analyze several authenticated key agreement protocols and uncover various theoretical...
Feng Hao
SAC
2010
ACM
15 years 3 months ago
Secret interest groups (SIGs) in social networks with an implementation on Facebook
In this paper we present the first framework that allows the creation of Secret Interest Groups (SIGs) in Online Social Networks; SIGs are self managed groups formed outside of t...
Alessandro Sorniotti, Refik Molva