Sciweavers

299 search results - page 35 / 60
» Deniable Authentication on the Internet
Sort
View
120
Voted
AGENTS
1998
Springer
15 years 6 months ago
Personal Security Agent: KQML-Based PKI
Certificate management infrastructure, a.k.a. PKI (Public Key Infrastructure), which issues and provides access to public key certificates to preserve the integrity of a public ke...
Qi He, Katia P. Sycara, Timothy W. Finin
128
Voted
WMI
2001
147views more  WMI 2001»
15 years 3 months ago
A wireless public access infrastructure for supporting mobile context-aware IPv6 applications
This paper presents a novel wireless access point architecture designed to support the development of next generation mobile context-aware applications over metropolitan scale are...
Adrian Friday, Maomao Wu, Stefan Schmid, Joe Finne...
103
Voted
ISIWI
2000
15 years 3 months ago
Der Autor im digitalen Medium - ein notwendiges Konstrukt?
This work shows the extent to which the Internet, with its value-added effects, network and interaction capabilites, changes the conventional understanding of the term ,,author&qu...
Stephan Werner
142
Voted
WMASH
2005
ACM
15 years 7 months ago
WilmaGate: a new open access gateway for hotspot management
Wireless access has already become a ubiquitous way to connect to the Internet, but the mushrooming of wireless access infrastructures throughout the world has given rise to a wid...
Mauro Brunato, Danilo Severina
ACISP
2009
Springer
15 years 8 months ago
Towards Denial-of-Service-Resilient Key Agreement Protocols
Denial of service resilience is an important practical consideration for key agreement protocols in any hostile environment such as the Internet. There are well-known models that ...
Douglas Stebila, Berkant Ustaoglu