Sciweavers

1656 search results - page 60 / 332
» Secure Computation Without Authentication
Sort
View
106
Voted
CCS
2009
ACM
16 years 1 months ago
An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem
In this paper, we present a new ID-based two-party authenticated key exchange (AKE) protocol, which makes use of a new technique called twin Diffie-Hellman problem proposed by Cas...
Hai Huang, Zhenfu Cao
128
Voted
MA
2000
Springer
135views Communications» more  MA 2000»
15 years 4 months ago
Principles of Mobile Maude
Mobile Maude is a mobile agent language extending the rewriting logic language Maude and supporting mobile computation. Mobile Maude uses reflection to obtain a simple and general ...
Francisco Durán, Steven Eker, Patrick Linco...
95
Voted
ACSC
2010
IEEE
14 years 7 months ago
Analysis of the periodical payment framework using restricted proxy certificates
This paper discusses the design and implementation of a payment framework that is loosely based on the direct debit payment model. We define such payments as one in which customer...
Grigori Goldman, Lawrie Brown
216
Voted

Lecture Notes
404views
16 years 11 months ago
Network Security
A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
Raj Jain
115
Voted
ESORICS
2007
Springer
15 years 7 months ago
Graphical Password Authentication Using Cued Click Points
We propose and examine the usability and security of Cued Click Points (CCP), a cued-recall graphical password technique. Users click on one point per image for a sequence of image...
Sonia Chiasson, Paul C. van Oorschot, Robert Biddl...