Sciweavers

620 search results - page 28 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
ICB
2007
Springer
135views Biometrics» more  ICB 2007»
15 years 4 months ago
Feeling Is Believing: A Secure Template Exchange Protocol
We use grip pattern based biometrics as a secure side channel to achieve pre-authentication in a protocol that sets up a secure channel between two hand held devices. The protocol ...
Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Ray...
ACISP
2004
Springer
15 years 1 months ago
Secure Bilinear Diffie-Hellman Bits
The Weil and Tate pairings are a popular new gadget in cryptography and have found many applications, including identity-based cryptography. In particular, the pairings have been u...
Steven D. Galbraith, Herbie J. Hopkins, Igor Shpar...
ISEM
2006
90views more  ISEM 2006»
14 years 10 months ago
Using GXL for exchanging business process models
Abstract The GXL Graph eXchange Language is an XML-based standard exchange language for sharing graph data between tools. GXL can be customized to exchange application specific typ...
Andreas Winter, Carlo Simon
ICMAS
2000
14 years 11 months ago
Safe Exchange Planner
Safe exchange is a key issue in multiagent systems, especially in electronic transactions where nondelivery is a major problem. In this paper we present a unified framework for mo...
Tuomas Sandholm, Vincent Ferrandon
EDBTW
2006
Springer
14 years 12 months ago
Management of Executable Schema Mappings for XML Data Exchange
Abstract. Executable schema mappings between XML schemas are essential to support numerous data management tasks such as data exchange, data integration and schema evolution. The n...
Tadeusz Pankowski