Sciweavers

1058 search results - page 92 / 212
» Secure Group Communications Using Key Graphs
Sort
View
CANS
2006
Springer
83views Cryptology» more  CANS 2006»
15 years 6 months ago
Efficient Mutual Data Authentication Using Manually Authenticated Strings
Abstract. Solutions for an easy and secure setup of a wireless connection between two devices are urgently needed for WLAN, Wireless USB, Bluetooth and similar standards for short ...
Sven Laur, Kaisa Nyberg
MOBICOM
2006
ACM
15 years 8 months ago
Low-cost communication for rural internet kiosks using mechanical backhaul
Rural kiosks in developing countries provide a variety of services such as birth, marriage, and death certificates, electricity bill collection, land records, email services, and...
Aaditeshwar Seth, D. Kroeker, Matei A. Zaharia, Sh...
EUROCRYPT
2003
Springer
15 years 7 months ago
Extracting Group Signatures from Traitor Tracing Schemes
Abstract. Digital Signatures emerge naturally from Public-Key Encryption based on trapdoor permutations, and the “duality” of the two primitives was noted as early as Diffie-He...
Aggelos Kiayias, Moti Yung
117
Voted
WWW
2005
ACM
16 years 3 months ago
Signing individual fragments of an RDF graph
Being able to determine the provenience of statements is a fundamental step in any SW trust modeling. We propose a methodology that allows signing of small groups of RDF statement...
Giovanni Tummarello, Christian Morbidoni, Paolo Pu...
143
Voted
GI
2004
Springer
15 years 7 months ago
Communicating Agents Architecture with Applications in Multimodal Human Computer Interaction
: We present our idea of solving parts of the vision task with an organic computing approach. We have designed a multiagent system (MAS) of many different modules working on differ...
Maximilian Krüger, Achim Schäfer, Andrea...