Sciweavers

375 search results - page 41 / 75
» Using Mobile Agents for Secure Biometric Authentication
Sort
View
92
Voted
JCP
2006
120views more  JCP 2006»
14 years 11 months ago
Password-authenticated Key Exchange using Efficient MACs
Abstract-- This paper is concerned with passwordauthenticated key agreement protocols. Designing such protocols represents an interesting challenge since there is no standard way o...
Maurizio Adriano Strangio
HICSS
2006
IEEE
118views Biometrics» more  HICSS 2006»
15 years 5 months ago
Exploiting Mobile Agents for Structured Distributed Software-Implemented Fault Injection
Embedded distributed real-time systems are traditionally used in safety-critical application areas such as avionics, healthcare, and the automotive sector. Assuring dependability ...
Thomas M. Galla, Karin Anna Hummel, Burkhard Peer
JNW
2006
186views more  JNW 2006»
14 years 11 months ago
Developing Network Domain Security (NDS) Model for IP Multimedia Subsystem (IMS)
In this research article we discuss the protocols, architecture and propose the design of Network Domain Security (NDS) model for IP Multimedia Subsystem (IMS). The IMS is standard...
Muhammad Sher, Thomas Magedanz
SOUPS
2009
ACM
15 years 6 months ago
Usability and security of out-of-band channels in secure device pairing protocols
Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge that needs to be overcome if the promise of mobile and pervasive computing is to b...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
CORR
2010
Springer
117views Education» more  CORR 2010»
14 years 12 months ago
SMEmail - A New Protocol for the Secure E-mail in Mobile Environments
The electronic mail plays an unavoidable role in the humankind communications. With the great interest for the connection via mobile platforms, and the growing number of vulnerabil...
Mohsen Toorani