Sciweavers

1116 search results - page 83 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
ICCSA
2009
Springer
15 years 7 months ago
On a Construction of Short Digests for Authenticating Ad Hoc Networks
In pervasive ad-hoc networks, there is a need for devices to be able to communicate securely, despite the lack of apriori shared security associations and the absence of an infrast...
Khoongming Khoo, Ford-Long Wong, Chu-Wee Lim
82
Voted
PPDP
2010
Springer
14 years 11 months ago
Generic record combinators with static type checking
Common record systems only provide access to individual record fields. However, it is often useful to have generic record combinators, that is, functions that work with complete ...
Wolfgang Jeltsch
125
Voted
MOBISYS
2011
ACM
14 years 3 months ago
ProxiMate: proximity-based secure pairing using ambient wireless signals
Forming secure associations between wireless devices that do not share a prior trust relationship is an important problem. This paper presents ProxiMate, a system that allows wire...
Suhas Mathur, Robert C. Miller, Alexander Varshavs...
80
Voted
ICDAR
2003
IEEE
15 years 6 months ago
SAGENT: A Novel Technique for Document Modeling for Secure Access and Distribution
A novel strategy for the representation and manipulation of distributed documents, potentially complex and heterogeneous, is presented in this paper. The document under the propos...
Sanaul Hoque, Hossam Selim, Gareth Howells, Michae...
115
Voted
SP
2006
IEEE
102views Security Privacy» more  SP 2006»
15 years 6 months ago
Secure Device Pairing based on a Visual Channel (Short Paper)
Recently several researchers and practitioners have begun to address the problem of how to set up secure communication between two devices without the assistance of a trusted thir...
Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N...