Sciweavers

1255 search results - page 66 / 251
» On Simple and Secure Key Distribution
Sort
View
MDM
2007
Springer
111views Communications» more  MDM 2007»
15 years 9 months ago
FragDB - Secure Localized Storage Based on Super-Distributed RFID-Tag Infrastructures
Smart environments and wearables will make the storage and subsequent sharing of digitized multimedia diaries and meeting protocols – whom we meet, or what we say or do – chea...
Marc Langheinrich
MIDDLEWARE
2007
Springer
15 years 9 months ago
Combining ontology queries with key word search in the GloServ service discovery system
GloServ is a global service discovery system which aggregates different types of services in a globally distributed network. It improves on current service discovery systems by sc...
Knarig Arabshian, Henning Schulzrinne
WETICE
2000
IEEE
15 years 7 months ago
Secure Self-Certified COTS
With the advent and the rising popularity of networks, Internet, intranets and distributed systems, security is becoming one of the major concerns in IT research. An increasing nu...
Mourad Debbabi, E. Giasson, Béchir Ktari, F...
TCC
2007
Springer
104views Cryptology» more  TCC 2007»
15 years 9 months ago
Unifying Classical and Quantum Key Distillation
Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state ρABE. In addition, ...
Matthias Christandl, Artur Ekert, Michal Horodecki...
128
Voted
SP
1997
IEEE
139views Security Privacy» more  SP 1997»
15 years 7 months ago
Number Theoretic Attacks on Secure Password Schemes
Encrypted Key Exchange (EKE) [1, 2] allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secre...
Sarvar Patel