Sciweavers

620 search results - page 62 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
CCS
2001
ACM
15 years 2 months ago
Flexible authentication of XML documents
XML is increasingly becoming the format of choice for information exchange on the Internet. As this trend grows, one can expect that documents (or collections thereof) may get qui...
Premkumar T. Devanbu, Michael Gertz, April Kwong, ...
GLOBECOM
2010
IEEE
14 years 7 months ago
Practical Defenses for Evil Twin Attacks in 802.11
Open-access 802.11 wireless networks are commonly deployed in cafes, bookstores, and other public spaces to provide free Internet connectivity. These networks are convenient to dep...
Harold Gonzales, Kevin S. Bauer, Janne Lindqvist, ...
IEEECIT
2010
IEEE
14 years 7 months ago
On Small Subgroup Non-confinement Attack
The small subgroup confinement attack works by confining cryptographic operations within a small subgroup, in which exhaustive search is feasible. This attack is overt and hence ca...
Feng Hao
IAT
2008
IEEE
15 years 4 months ago
Integrating Trust with Public Reputation in Location-Based Social Networks for Recommendation Making
The recent emergence of location-based social networking services is revolutionizing web-based social networking allowing users to share real-life experiences via geo-tagged user-...
Touhid Bhuiyan, Yue Xu, Audun Jøsang
SASO
2007
IEEE
15 years 4 months ago
Towards Supporting Interactions between Self-Managed Cells
Management in pervasive systems cannot rely on human intervention or centralised decision-making functions. It must be devolved, based on local decision-making and feedback contro...
Alberto E. Schaeffer Filho, Emil C. Lupu, Naranker...