Sciweavers

12478 search results - page 204 / 2496
» Secure Interaction Design
Sort
View
ACISP
2008
Springer
15 years 5 months ago
Efficient One-Round Key Exchange in the Standard Model
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of...
Colin Boyd, Yvonne Cliff, Juan Manuel Gonzá...
ADBIS
2009
Springer
144views Database» more  ADBIS 2009»
15 years 10 months ago
Learning Support and Legally Ruled Collaboration in the VirtualLife Virtual World Platform
The paper addresses the purposes and design decisions produced while developing a peer-to-peer virtual world platform. The work is being done within the FP7 VirtualLife project. Th...
Vytautas Cyras, Kristina Lapin
INDOCRYPT
2009
Springer
15 years 10 months ago
Two Attacks against the Ff RFID Protocol
This paper investigates a new family of RFID protocols called Ff that grew out of a proposal made at ESORICS 2007. This family has the property of having highly efficient implement...
Olivier Billet, Kaoutar Elkhiyaoui
PPDP
2009
Springer
15 years 10 months ago
The RPC calculus
Several recent language designs have offered a unified language for programming a distributed system, with explicit notation of locations; we call these “location-aware” lan...
Ezra Cooper, Philip Wadler
HICSS
2008
IEEE
148views Biometrics» more  HICSS 2008»
15 years 10 months ago
Consumer-Centric and Privacy-Preserving Identity Management for Distributed E-Health Systems
A new framework of privacy-preserving identity management for distributed e-Health systems is proposed. Utilizing a consumer-centric approach, the healthcare consumer maintains a ...
Richard Au, Peter Croll