Sciweavers

620 search results - page 95 / 124
» On the Leakage-Resilient Key Exchange
Sort
View
NDSS
2002
IEEE
15 years 2 months ago
Advanced Client/Server Authentication in TLS
Many business transactions on the Internet occur between strangers, that is, between entities with no prior relationship and no common security domain. Traditional security approa...
Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsl...
67
Voted
COLCOM
2009
IEEE
15 years 2 months ago
Still alive: Extending keep-alive intervals in P2P overlay networks
Abstract—Nodes within existing P2P networks typically exchange periodic keep-alive messages in order to maintain network connections between neighbours. This paper investigates a...
Richard Price, Peter Tiño
GSN
2009
Springer
140views Sensor Networks» more  GSN 2009»
15 years 2 months ago
Estimation of Pollutant-Emitting Point-Sources Using Resource-Constrained Sensor Networks
We present an algorithm that makes an appropriate use of a Kalman filter combined with a geometric computation with respect to the localisation of a pollutant-emitting point sourc...
Michael Zoumboulakis, George Roussos
CAISE
2001
Springer
15 years 2 months ago
A Semantic Approach to Integrating XML and Structured Data Sources
XML is fast becoming the standard for information exchange on the Internet. As such, information expressed in XML will need to be integrated with existing information systems, whi...
Peter McBrien, Alexandra Poulovassilis
EUROCRYPT
2001
Springer
15 years 2 months ago
Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems
Abstract. We show that finding an efficiently computable injective homomorphism from the XTR subgroup into the group of points over GF(p2 ) of a particular type of supersingular e...
Eric R. Verheul