Sciweavers

620 search results - page 52 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
ICDT
2012
ACM
251views Database» more  ICDT 2012»
13 years 7 days ago
Computing universal models under guarded TGDs
A universal model of a database D and a set Σ of integrity constraints is a database that extends D, satisfies Σ, and is most general in the sense that it contains sound and co...
André Hernich
ADVIS
2004
Springer
15 years 3 months ago
Practical and Secure E-Mail System (PractiSES)
In this paper, a practical and secure e-mail system (called “PractiSES”) that performs public key distribution and management in a unique way is proposed. PractiSES is a networ...
Albert Levi, Mahmut Özcan
WIMOB
2008
IEEE
15 years 4 months ago
On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks
Energy is a central concern in the deployment of wireless sensor networks. In this paper, we investigate the energy cost of cryptographic protocols, both from a communication and ...
Giacomo de Meulenaer, François Gosset, Fran...
SP
1997
IEEE
139views Security Privacy» more  SP 1997»
15 years 1 months ago
Number Theoretic Attacks on Secure Password Schemes
Encrypted Key Exchange (EKE) [1, 2] allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secre...
Sarvar Patel
JCAM
2010
111views more  JCAM 2010»
14 years 4 months ago
Finite element simulation of compressible particle-laden gas flows
A macroscopic two-fluid model of compressible particle-laden gas flows is considered. The governing equations are discretized by a high-resolution finite element method based on a...
Marcel Gurris, Dmitri Kuzmin, Stefan Turek