Sciweavers

3145 search results - page 22 / 629
» Key Improvements to XTR
Sort
View
63
Voted
IMA
1997
Springer
88views Cryptology» more  IMA 1997»
15 years 1 months ago
Increasing Efficiency of International Key Escrow in Mutually Mistrusting Domains
This paper is concerned with key escrow protocols for use in international communications environments, where communication domains do not necessarily trust one another. It is conc...
Keith M. Martin
79
Voted
APNOMS
2006
Springer
15 years 1 months ago
A Resource-Optimal Key Pre-distribution Scheme with Enhanced Security for Wireless Sensor Networks
Abstract. This paper proposes an efficient resource-optimal key predistribution scheme for providing improved security in wireless sensor networks. We exploit the advantages of two...
Tran Thanh Dai, Al-Sakib Khan Pathan, Choong Seon ...
73
Voted
CLEF
2010
Springer
14 years 10 months ago
Experiments with Citation Mining and Key-Term Extraction for Prior Art Search
This technical note presents the system built for the IP track of CLEF 2010 based on PATATRAS (PATent and Article Tracking, Retrieval and AnalysiS), the modular search infrastruct...
Patrice Lopez, Laurent Romary
IJNSEC
2006
110views more  IJNSEC 2006»
14 years 9 months ago
The Improvement of YSYCT Scheme for Imbalanced Wireless Network
Recently, Yeh et al. proposed an improved password authenticated key exchange scheme (YSYCT scheme) which is secure against undetectable on-line password guessing attacks and prov...
Jung-Wen Lo
TSP
2010
14 years 4 months ago
Improved dual decomposition based optimization for DSL dynamic spectrum management
Dynamic spectrum management (DSM) has been recognized as a key technology to significantly improve the performance of digital subscriber line (DSL) broadband access networks. The b...
Paschalis Tsiaflakis, Ion Necoara, Johan A. K. Suy...