Sciweavers

2472 search results - page 84 / 495
» Parallel Key Exchange
Sort
View
SP
1997
IEEE
139views Security Privacy» more  SP 1997»
15 years 4 months ago
Number Theoretic Attacks on Secure Password Schemes
Encrypted Key Exchange (EKE) [1, 2] allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secre...
Sarvar Patel
105
Voted
AINA
2006
IEEE
15 years 6 months ago
MIS Protocol for Secure Connection and Fast Handover on Wireless LAN
MIS (Mobile Internet Services) architecture is designed for secure connection and fast handover with wireless LAN. This architecture consists of three protocols, MISP (Mobile Inte...
Hitoshi Morioka, Hiroshi Mano, Motoyuki Ohrnori, M...
SAC
2003
ACM
15 years 6 months ago
Organizational Modeling in UML and XML in the Context of Workflow Systems
Workflow technology plays a key role as an enabler in E-Commerce applications, such as supply chains. Until recently the major share of the attention of workflow systems researche...
Wil M. P. van der Aalst, Akhil Kumar, H. M. W. (Er...
43
Voted
HCI
2007
15 years 2 months ago
Use of Chinese Short Messages
Short text message (SMS) as a key communication means in China received a lot of attention in research community. 114 subjects attended the study, sharing totally 10843 SMS they se...
Dafei Ma, Fumiko Ichikawa, Ying Liu, Li Jiang
88
Voted
CCR
2010
130views more  CCR 2010»
15 years 28 days ago
Arguments for an information-centric internetworking architecture
The current Internet architecture focuses on communicating entities, largely leaving aside the information to be ex-changed among them. However, trends in communication scenarios ...
Dirk Trossen, Mikko Särelä, Karen R. Sol...