Sciweavers

68 search results - page 8 / 14
» Modelling to Enhance GSM Network Security
Sort
View
DEXAW
2007
IEEE
113views Database» more  DEXAW 2007»
15 years 3 months ago
A new domain-based payment model for emerging mobile commerce scenarios
Most of the security proposals in m-commerce scenarios have been based on a classical payment model, which basically establishes relationships across domains among customers and me...
Diego Suarez, Joaquín Torres Márquez...
JCP
2008
206views more  JCP 2008»
14 years 11 months ago
SW-R2P: A Trusted Small World Overlay P2P Network with Zero Knowledge Identification
In order to implement both the efficiency and security in the Peer-to-Peer (P2P) network, we design a trusted small world overlay P2P network with the role based and reputation bas...
Yingjie Xia, Guanghua Song, Yao Zheng
ICCD
2000
IEEE
106views Hardware» more  ICCD 2000»
15 years 4 months ago
Fast Subword Permutation Instructions Using Omega and Flip Network Stages
This paper proposes a new way of efficiently doing arbitrary ¢ -bit permutations in programmable processors modeled on the theory of omega and flip networks. The new omflip ins...
Xiao Yang, Ruby B. Lee
95
Voted
CCS
2009
ACM
16 years 9 days ago
An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem
In this paper, we present a new ID-based two-party authenticated key exchange (AKE) protocol, which makes use of a new technique called twin Diffie-Hellman problem proposed by Cas...
Hai Huang, Zhenfu Cao
SRDS
2007
IEEE
15 years 6 months ago
Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage
We are witnessing a revival of Storage Service Providers in the form of new vendors as well as traditional players. While storage outsourcing is cost-effective, many companies are...
Vishal Kher, Yongdae Kim