Sciweavers

620 search results - page 48 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
DAGM
2003
Springer
15 years 3 months ago
Image Sequence Analysis in Environmental and Live Sciences
Image sequence processing techniques are essential to study dynamical processes such as exchange, growth, and transport processes. In this survey paper, a generalized framework for...
Bernd Jähne
FC
2001
Springer
94views Cryptology» more  FC 2001»
15 years 2 months ago
Mutual Authentication for Low-Power Mobile Devices
We propose methods for mutual authentication and key exchange. Our methods are well suited for applications with strict power consumption restrictions, such as wireless medical imp...
Markus Jakobsson, David Pointcheval
SERVICES
2008
71views more  SERVICES 2008»
14 years 11 months ago
Identifying Opportunities for Web Services Security Performance Optimizations
WS-Security is an essential component of the Web services protocol stack. WS-Security provides end-to-end security properties, thereby assuring the participation of nonsecure tran...
Robert A. van Engelen, Wei Zhang
BIB
2007
124views more  BIB 2007»
14 years 10 months ago
Informatics in neuroscience
The application of informatics to neuroscience goes far beyond ‘traditional’ bioinformatics modalities such as DNA sequences. In this review, we describe how informatics is be...
Leon French, Paul Pavlidis
ER
2007
Springer
111views Database» more  ER 2007»
15 years 4 months ago
Provability-Based Semantic Interoperability Via Translation Graphs
Provability-based semantic interoperability (PBSI) is a kind of interoperability that transcends mere syntactic translation to allow for robust, meaningful information exchange acr...
Joshua Taylor, Andrew Shilliday, Selmer Bringsjord