Sciweavers

20175 search results - page 133 / 4035
» Is abstraction the key to computing
Sort
View
93
Voted
AINA
2005
IEEE
15 years 6 months ago
Secure One-Round Tripartite Authenticated Key Agreement Protocol from Weil Pairing
In 2000, Joux proposed a one-round protocol for tripartite Diffie-Hellman. In 2003, Shim presented an efficient one-round tripartite authenticated key agreement protocol based on ...
Chu-Hsing Lin, Hsiu-Hsia Lin
95
Voted
ISWC
2003
IEEE
15 years 6 months ago
KeyMenu: A Keyboard Based Hierarchical Menu
KeyMenu is a keyboard based hierarchical menu system intended for use on a wearable computer. It is designed for use in conjunction with the Twiddler one–handed wearable keyboar...
Kent Lyons, Nirmal J. Patel, Thad Starner
103
Voted
APNOMS
2007
Springer
15 years 4 months ago
Security Management in Wireless Sensor Networks with a Public Key Based Scheme
This paper proposes an efficient approach for managing the security in WSN. Our approach uses the notion of public key cryptography in which two different keys are used for encrypt...
Al-Sakib Khan Pathan, Jae Hyun Ryu, Md. Mokammel H...
INFOCOM
1999
IEEE
15 years 5 months ago
Key Management for Secure Internet Multicast Using Boolean Function Minimization Techniques
Abstract-The Internet today provides no support for privacy or authentication of multicast packets. However,an increasing number of applications will require secure multicast servi...
Isabella Chang, Robert Engel, Dilip D. Kandlur, Di...
TCOS
2010
14 years 7 months ago
J-PAKE: Authenticated Key Exchange without PKI
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication be...
Feng Hao, Peter Ryan