Sciweavers

2209 search results - page 162 / 442
» Language Based Secure Communication
Sort
View
ISN
1998
Springer
15 years 8 months ago
Business and Market Models of Brokerage in Network-Based Commerce
Enterprise models, based on the responsibilities and relationships underlying market activities, are used to provide a framework for representing and analysing the activity of bro...
Ros Strens, Mike Martin, John E. Dobson, Stephen P...
136
Voted
AMC
2005
188views more  AMC 2005»
15 years 4 months ago
An efficient signcryption scheme with forward secrecy based on elliptic curve
An efficient signcryption scheme based on elliptic curve is proposed in this paper. The signcryption scheme combines digital signature and encryption functions. The proposed schem...
Ren-Junn Hwang, Chih-Hua Lai, Feng-Fu Su
167
Voted
CNSR
2008
IEEE
214views Communications» more  CNSR 2008»
15 years 11 months ago
HGKM: A Group-Based Key Management Scheme for Sensor Networks Using Deployment Knowledge
Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of t...
Ngo Trong Canh, Young-Koo Lee, Sungyoung Lee
ITNG
2008
IEEE
15 years 11 months ago
Chord-Based Key Establishment Schemes for Sensor Networks
— Because of limited resources at sensor nodes, sensor networks typically adopt symmetric-key algorithms to provide security functions such as protecting communications between n...
Fan Zhang, Zhijie Jerry Shi, Bing Wang
VTC
2007
IEEE
138views Communications» more  VTC 2007»
15 years 11 months ago
Performance Evaluation of IEEE 802.11-based WLANs in Vehicular Scenarios
—Communication between cars can be exploited for various applications. Security enhancements as well as interactive games played by occupants of different cars are only two examp...
Matthias Wellens, Burkhard Westphal, Petri Mä...