Sciweavers

620 search results - page 61 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
89
Voted
JECR
2002
151views more  JECR 2002»
14 years 9 months ago
The Ethics of eBanking
In this paper we explore the ethics of business-to-business electronic commerce, with a focus on the banking sector. A case study of online foreign exchange developments at an inv...
Lisa Harris, Laura J. Spence
ISW
2010
Springer
14 years 7 months ago
Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents
We analyze the Extended Access Control (EAC) protocol for authenticated key agreement, recently proposed by the German Federal Office for Information Security (BSI) for the deploym...
Özgür Dagdelen, Marc Fischlin
SIGMOD
2011
ACM
169views Database» more  SIGMOD 2011»
14 years 18 days ago
Leveraging query logs for schema mapping generation in U-MAP
In this paper, we introduce U-MAP, a new system for schema mapping generation. U-MAP builds upon and extends existing schema mapping techniques. However, it mitigates some key pro...
Hazem Elmeleegy, Ahmed K. Elmagarmid, Jaewoo Lee
CRYPTO
2005
Springer
113views Cryptology» more  CRYPTO 2005»
15 years 3 months ago
Secure Communications over Insecure Channels Based on Short Authenticated Strings
Abstract. We propose a way to establish peer-to-peer authenticated communications over an insecure channel by using an extra channel which can authenticate very short strings, e.g....
Serge Vaudenay
ICC
2007
IEEE
106views Communications» more  ICC 2007»
15 years 4 months ago
A Distributed Approach to End-to-End Network Topology Inference
Abstract— To construct an efficient overlay network, the information of underlay is important. However, the inference of an underlay topology is not easy. We consider using end-...
Xing Jin, Qiuyan Xia, Shueng-Han Gary Chan