Sciweavers

3751 search results - page 190 / 751
» Events in security protocols
Sort
View
IJNSEC
2006
122views more  IJNSEC 2006»
15 years 4 months ago
A Hash-based Strong Password Authentication Protocol with User Anonymity
Password authentication protocols range from complex public-key cryptosystems to simple hash-based password authentication schemes. One common feature of these protocols is that t...
Kumar V. Mangipudi, Rajendra S. Katti
154
Voted
IJNSEC
2010
127views more  IJNSEC 2010»
14 years 11 months ago
A Better Improvement on the Integrated Diffie-Hellman-DSA Key Agreement Protocol
Harn et al. proposed a series of Diffie-Hellman key exchange protocols which are integrated into Digital Signature Algorithm in 2004. Recently, Phan pointed out that Harn et al.&#...
Jie Liu, Jianhua Li
PERCOM
2004
ACM
16 years 3 months ago
Towards Context-aware Security: An Authorization Architecture for Intranet Environments
This paper introduces a context-aware authorization architecture that is designed to augment existing network security protocols in an Intranet environment. It describes the archi...
Chris Wullems, Mark Looi, Andrew Clark
IPSN
2005
Springer
15 years 9 months ago
Towards optimal sleep scheduling in sensor networks for rare-event detection
— Lifetime maximization is one key element in the design of sensor-network-based surveillance applications. We propose a protocol for node sleep scheduling that guarantees a boun...
Qing Cao, Tarek F. Abdelzaher, Tian He, John A. St...
FMCO
2003
Springer
121views Formal Methods» more  FMCO 2003»
15 years 9 months ago
TulaFale: A Security Tool for Web Services
Web services security specifications are typically expressed as a mixture of XML schemas, example messages, and narrative explanations. We propose a new specification language fo...
Karthikeyan Bhargavan, Cédric Fournet, Andr...