Sciweavers

2209 search results - page 246 / 442
» Language Based Secure Communication
Sort
View
WIMOB
2008
IEEE
15 years 10 months ago
An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs
— Node compromise is a serious threat in wireless sensor networks, as it enables an adversary to perform various attacks. Many security schemes exploit the redundancy of many wir...
Christoph Krauß, Markus Schneider, Claudia E...
126
Voted
ICICS
2005
Springer
15 years 9 months ago
Generic Construction of (Identity-Based) Perfect Concurrent Signatures
The notion of concurrent signatures was recently introduced by Chen, Kudla and Paterson. In concurrent signature schemes, two entities can produce two signatures that are not bindi...
Sherman S. M. Chow, Willy Susilo
CCR
2000
101views more  CCR 2000»
15 years 3 months ago
Knowledge-proof based versatile smart card verification protocol
We propose a zero-knowledge interactive proof based identification and signature scheme. The protocol is based on Euler's totient function and discrete logarithms over the ri...
Dae Hun Nyang, Joo-Seok Song
ACOM
2004
Springer
15 years 9 months ago
Toward a Suite of Performatives Based Upon Joint Intention Theory
Agent communication languages defined using joint intention theory have enjoyed a long research history. A number of performatives have been defined and refined in this literature ...
Marcus J. Huber, Sanjeev Kumar, David McGee
ICFEM
2010
Springer
15 years 2 months ago
Model-Driven Protocol Design Based on Component Oriented Modeling
Abstract. Due to new emerging areas in the communication field there is a constant need for the design of novel communication protocols. This demands techniques for a rapid and eff...
Prabhu Shankar Kaliappan, Hartmut König, Seba...