Sciweavers

24529 search results - page 166 / 4906
» Computing on Authenticated Data
Sort
View
SACMAT
2005
ACM
15 years 8 months ago
Adaptive trust negotiation and access control
Electronic transactions regularly occur between business partners in separate security domains. Trust negotiation is an approach that provides an open authentication and access-co...
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travi...
WS
2005
ACM
15 years 8 months ago
Strengthening EPC tags against cloning
The EPC (Electronic Product Code) tag is a form of RFID (Radio-Frequency IDentification) device that is emerging as a successor to the printed barcode. Like barcodes, EPC tags emi...
Ari Juels
ARCS
2004
Springer
15 years 6 months ago
A Note on Certificate Path Verification in Next Generation Mobile Communications
Abstract. Certificate-based authentication of parties provides a powerful means for verifying claimed identities, since communicating partners do not have to exchange secrets in ad...
Matthias Enzmann, Elli Giessler, Michael Haisch, B...
STOC
1995
ACM
107views Algorithms» more  STOC 1995»
15 years 6 months ago
Incremental cryptography and application to virus protection
The goal of incremental cryptography is to design cryptographic algorithms with the property that having applied the algorithm to a document, it is possible to quickly update the ...
Mihir Bellare, Oded Goldreich, Shafi Goldwasser
CE
2005
58views more  CE 2005»
15 years 3 months ago
Does ICT contribute to powerful learning environments in primary education?
In powerful learning environments, rich contexts and authentic tasks are presented to pupils. Active, autonomous and co-operative learning is stimulated, and the curriculum is ada...
Ed Smeets