Sciweavers

620 search results - page 66 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
ESORICS
2003
Springer
15 years 3 months ago
Symmetric Authentication within a Simulatable Cryptographic Library
Abstract. Proofs of security protocols typically employ simple abstractions of cryptographic operations, so that large parts of such proofs pendent of cryptographic details. The ty...
Michael Backes, Birgit Pfitzmann, Michael Waidner
SAC
2010
ACM
15 years 4 months ago
CNL4DSA: a controlled natural language for data sharing agreements
A Data Sharing Agreement (DSA) is an agreement among contracting parties regulating how they share data. A DSA represents a flexible mean to assure privacy of data exchanged on t...
Ilaria Matteucci, Marinella Petrocchi, Marco Luca ...
ICCSA
2009
Springer
15 years 4 months ago
On a Construction of Short Digests for Authenticating Ad Hoc Networks
In pervasive ad-hoc networks, there is a need for devices to be able to communicate securely, despite the lack of apriori shared security associations and the absence of an infrast...
Khoongming Khoo, Ford-Long Wong, Chu-Wee Lim
ICAS
2009
IEEE
169views Robotics» more  ICAS 2009»
15 years 4 months ago
Ontonuts: Reusable Semantic Components for Multi-agent Systems
The volumes of data in information systems are growing drastically. The systems become increasingly complex in trying to handle heterogeneity of ubiquitous components, standards, ...
Sergiy Nikitin, Artem Katasonov, Vagan Y. Terziyan
RTCSA
2009
IEEE
15 years 4 months ago
PLL Based Time Synchronization in Wireless Sensor Networks
Abstract—Time synchronization is a key component in numerous wireless sensor network applications. Most of the current software based time synchronization approaches suffer from ...
Gang Zhou, Sachin Shetty, George Simms, Min Song