Sciweavers

609 search results - page 45 / 122
» One-Time-Password-Authenticated Key Exchange
Sort
View
ICNC
2005
Springer
15 years 5 months ago
Adaptive Parallel Ant Colony Algorithm
: Two strategies for information exchange between processors in parallel ant colony algorithm are presented. Theses strategies can make each processor choose other processors to co...
Ling Chen, Chunfang Zhang
ISPE
2003
15 years 1 months ago
PLIB ontology for B2B electronic commerce
: Currently computers are changing from single isolated devices to entry points into a world wide network of information exchange and business transactions called the World Wide We...
Youcef Aklouf, Guy Pierra, Yamine Aït Ameur, ...
INFOCOM
1998
IEEE
15 years 4 months ago
Compact and Unforgeable Key Establishment over an ATM Network
Authenticated session key establishment is a central issue in network security. This paper addresses a question on whether we can design a compact, efficient and authenticated key ...
Yuliang Zheng, Hideki Imai

Lecture Notes
404views
16 years 10 months ago
Network Security
A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
Raj Jain
IJNSEC
2008
146views more  IJNSEC 2008»
14 years 12 months ago
Formal Protocol Design of ESIKE Based on Authentication Tests
In this paper, we first present a concrete formal protocol design approach, which is based on authentication tests, to create an Efficient and Secure Internet Key Exchange (ESIKE)...
Rui Jiang, Aiqun Hu, Jianhua Li