Sciweavers

6682 search results - page 1242 / 1337
» networks 2006
Sort
View
98
Voted
ECTEL
2006
Springer
15 years 4 months ago
An Example of Participatory Design Methodology in a Project which Aims at Developing Individual and Organisational Learning in C
The experience described in this paper is being developed in the framework of the PALETTE1 project by two teams of researchers involved in collecting information from some Communi...
Amaury Daele, Martin Erpicum, Liliane Esnault, Fab...
99
Voted
EUC
2006
Springer
15 years 4 months ago
DiCa: Distributed Tag Access with Collision-Avoidance Among Mobile RFID Readers
Abstract. Advances in wireless and mobile communication technologies have enabled the development of various RFID-based systems and applications in addition to the extension of the...
Kwang-il Hwang, Kyung Tae Kim, Doo Seop Eom
EUROCRYPT
2006
Springer
15 years 4 months ago
Cryptography in Theory and Practice: The Case of Encryption in IPsec
Abstract. This paper studies the gaps that exist between cryptography as studied in theory, as defined in standards, as implemented by software engineers, and as actually consumed ...
Kenneth G. Paterson, Arnold K. L. Yau
EUROPKI
2006
Springer
15 years 4 months ago
On the Resilience of Key Agreement Protocols to Key Compromise Impersonation
Abstract. Key agreement protocols are a fundamental building block for ensuring authenticated and private communications between two parties over an insecure network. This paper fo...
Maurizio Adriano Strangio
133
Voted
EUROPKI
2006
Springer
15 years 4 months ago
Pseudonymous PKI for Ubiquitous Computing
Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is envisioned as a promising technique in many emerging applicat...
Ke Zeng
« Prev « First page 1242 / 1337 Last » Next »