Sciweavers

2209 search results - page 159 / 442
» Language Based Secure Communication
Sort
View
190
Voted
EUC
2008
Springer
15 years 6 months ago
An Improved Password-Based Authenticated Key Agreement Scheme for Pervasive Applications
Password authentication is a popular approach used for user authentication in pervasive computing environments due to its simplicity and convenience. To secure the transmission be...
Maw-Jinn Tsaur, Wei-Chi Ku, Hao-Rung Chung
ESORICS
2010
Springer
15 years 2 months ago
Speaker Recognition in Encrypted Voice Streams
Transmitting voice communication over untrusted networks puts personal information at risk. Although voice streams are typically encrypted to prevent unwanted eavesdropping, additi...
Michael Backes, Goran Doychev, Markus Dürmuth...
131
Voted
ENTCS
2007
112views more  ENTCS 2007»
15 years 4 months ago
A Calculus of Global Interaction based on Session Types
This paper proposes a calculus for describing communication-centred programs and discusses its use through a formal description of several use cases from real business protocols. ...
Marco Carbone, Kohei Honda, Nobuko Yoshida
152
Voted
SOSP
2001
ACM
16 years 1 months ago
BASE: Using Abstraction to Improve Fault Tolerance
ing Abstraction to Improve Fault Tolerance MIGUEL CASTRO Microsoft Research and RODRIGO RODRIGUES and BARBARA LISKOV MIT Laboratory for Computer Science Software errors are a major...
Rodrigo Rodrigues, Miguel Castro, Barbara Liskov
SAC
2010
ACM
15 years 11 months ago
T2D: a peer to peer trust management system based on disposition to trust
While the trust paradigm is essential to broadly extend the communication between the environment’s actors, the evaluation of trust becomes a challenge when confronted with init...
Rachid Saadi, Jean-Marc Pierson, Lionel Brunie