Sciweavers

574 search results - page 110 / 115
» Secure Remote Authentication Using Biometric Data
Sort
View
94
Voted
PKC
2004
Springer
195views Cryptology» more  PKC 2004»
15 years 2 months ago
An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications
Abstract. Bellare, Boldyreva, Desai, and Pointcheval [1] recently proposed a new security requirement of the encryption schemes called “keyprivacy.” It asks that the encryption...
Ryotaro Hayashi, Tatsuaki Okamoto, Keisuke Tanaka
ASIAN
2006
Springer
116views Algorithms» more  ASIAN 2006»
15 years 1 months ago
Secrecy Analysis in Protocol Composition Logic
We present formal proof rules for inductive reasoning about the way that data transmitted on the network remains secret from a malicious attacker. Extending a compositional protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
NOMS
2002
IEEE
112views Communications» more  NOMS 2002»
15 years 2 months ago
Paradigms for mobile agent based active monitoring of network systems
We present here a framework together with a set of paradigms for mobile agent based active monitoring of network systems. In our framework mobile agents are used to perform remote...
Anand Tripathi, Tanvir Ahmed, Sumedh Pathak, Megan...
ISCC
2000
IEEE
15 years 1 months ago
IsoWAN: A NASA Science and Engineering Information and Services Framework
We believe that the next evolutionary step in supporting wide-area application and services delivery to customers is a network framework that provides for collocation of applicati...
David J. Korsmeyer, Edward T. Chow, Michael P. Con...
CLEIEJ
2006
147views more  CLEIEJ 2006»
14 years 9 months ago
JADIMA: Virtual Machine Architecture for building JAVA Applications on Grid Platforms
This paper describes JADIMA (Java Distributed Machine), a collaborative platform to construct high performance distributed JAVA applications. JADIMA is a system that automatically...
Yudith Cardinale, Eduardo Blanco, Jesús De ...