Secure web services using two-way authentication and three-party key establishment for service delivery
With the advance of web technologies, a large quantity of transactions have been processed through web services. Service Provider needs encryption via public communication channel in order that web services can be delivered to Service Requester. Such encryptions can be realized using secure session...
| Main Authors: | Han, Song, Dillon, Tharam S., Chang, Elizabeth, Tian, Biming |
|---|---|
| Format: | Journal Article |
| Published: |
Elsevier
2009
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/22212 |
Similar Items
Pairing-based public-key encryption schemes with backward-and-forward security
by: Han, Song, et al.
Published: (2008)
by: Han, Song, et al.
Published: (2008)
Human Resource Service Delivery: Achieving Operational Excellence and Cost Efficiency through
Human Resources Shared Services
by: Loh, Rice Li Na
Published: (2009)
by: Loh, Rice Li Na
Published: (2009)
Generalized hash-binary-tree based self-healing key distribution with implicit authentication
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
A key management scheme for heterogeneous sensor networks using keyed-hash chain
by: Tian, Biming, et al.
Published: (2009)
by: Tian, Biming, et al.
Published: (2009)
Identifying barriers and improving communication between cancer service providers and Aboriginal patients and their families: the perspective of service providers
by: Shahid, Shaouli, et al.
Published: (2013)
by: Shahid, Shaouli, et al.
Published: (2013)
Improved security of Rijndael key expansion function
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017)
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017)
An Authentication Method for Secure Internet Transaction Using Smart Card and Secure Coprocessor
by: Ayad, Mustafa Abdsalam
Published: (2002)
by: Ayad, Mustafa Abdsalam
Published: (2002)
A Secure Key Management Model for Wireless Mesh Networks
by: Gao, Li, et al.
Published: (2010)
by: Gao, Li, et al.
Published: (2010)
A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks
by: Tian, Biming, et al.
Published: (2010)
by: Tian, Biming, et al.
Published: (2010)
Performance Measurement for a Logistics Services Provider to the Polymer Industry
by: Tok, King Lai
Published: (2007)
by: Tok, King Lai
Published: (2007)
Product delivery service provider selection and customer satisfaction in the era of internet of things: a Chinese e-retailers’ perspective
by: YU, Jie, et al.
Published: (2015)
by: YU, Jie, et al.
Published: (2015)
Exploring the effects of perceived service provider sincerity on consumers’ emotional state and satisfaction during travel service consumption
by: Gountas, Sandra, et al.
Published: (2011)
by: Gountas, Sandra, et al.
Published: (2011)
Digital signature-based secure communication in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011)
by: Parvin, Sazia, et al.
Published: (2011)
The Impact of trust and fairness by financial services on consumer satisfaction.
by: Ranganathan, Manassa
Published: (2019)
by: Ranganathan, Manassa
Published: (2019)
Alternative discrete variable protocol for point to point Quantum Key Distribution system
by: Ahmad Ghazali, Lizal Iswady
Published: (2012)
by: Ahmad Ghazali, Lizal Iswady
Published: (2012)
The Future of Automotive Personal Transport: Which Technologies - Electric, Service or the Combination Will Win In Different Markets?
by: Ge, Ping
Published: (2016)
by: Ge, Ping
Published: (2016)
The role of social media in collective learning / Khalid Abdul Wahid , Wan Saiful ‘Azzam Wan Ismail dan Haruthai Numprasertchai
by: Abdul Wahid, Khalid, et al.
Published: (2019)
by: Abdul Wahid, Khalid, et al.
Published: (2019)
Understanding how to recruit and retain participants to a Digital Health Intervention (DHI) for a unique service population
by: Patel, Shireen
Published: (2024)
by: Patel, Shireen
Published: (2024)
A self-healing and mutual-healing key distribution scheme using bilinear pairings for wireless networks
by: Tian, Biming, et al.
Published: (2008)
by: Tian, Biming, et al.
Published: (2008)
An efficient self-healing key distribution scheme
by: Tian, Biming, et al.
Published: (2008)
by: Tian, Biming, et al.
Published: (2008)
Reference architectural styles for service oriented computing
by: Dillon, Tharam S., et al.
Published: (2007)
by: Dillon, Tharam S., et al.
Published: (2007)
A performance-driven incentive-based approach for successful service delivery
by: Fachrunnisa, Olivia
Published: (2011)
by: Fachrunnisa, Olivia
Published: (2011)
Trust issues in a service oriented environment
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
by: Hussain, Farookh Khadeer, et al.
Published: (2006)
Perceived justice and consumer post service failure behaviour: the moderating role of failure severity, attachment styles, and brand authenticity
by: Randhir-Singh, Sarabjit Kaur
Published: (2021)
by: Randhir-Singh, Sarabjit Kaur
Published: (2021)
Multi-point collaborative authentication method based on user image intelligent collection in the internet of things
by: Li, Yunfa, et al.
Published: (2019)
by: Li, Yunfa, et al.
Published: (2019)
Secure Access To Authorized Resources Based On Fingerprint Authentication
by: Elmadani, Ahmed Baba
Published: (2003)
by: Elmadani, Ahmed Baba
Published: (2003)
Service role and outcome as moderators in intercultural service encounters
by: Sharma, Piyush, et al.
Published: (2015)
by: Sharma, Piyush, et al.
Published: (2015)
The role of shared intentions in the emergence of service ecosystems
by: Taillard, Marie, et al.
Published: (2016)
by: Taillard, Marie, et al.
Published: (2016)
Moth: a hybrid threat model for improving software security testing
by: Omotunde, Habeeb Oladapo
Published: (2018)
by: Omotunde, Habeeb Oladapo
Published: (2018)
An improved binary method for scalar multiplication in elliptic curve cryptography
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
A new encryption algorithm over elliptic curve
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Semantic service search, service evaluation and ranking in service oriented environment
by: Dong, Hai, et al.
Published: (2008)
by: Dong, Hai, et al.
Published: (2008)
A multi-factor authentication scheme using attack recognition and key generator technique
by: Mohd Ariffin, Noor Afiza
Published: (2017)
by: Mohd Ariffin, Noor Afiza
Published: (2017)
An Investigation of Service Operations Strategies: Evidence from Greek Service Organisations
by: Xakoustos, Georgios
Published: (2006)
by: Xakoustos, Georgios
Published: (2006)
Key management for wireless sensor network security
by: Tian, Biming
Published: (2011)
by: Tian, Biming
Published: (2011)
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Strategic perspectives of outsourcing; The view within the insurance industry
by: Kapoor, Avya
Published: (2008)
by: Kapoor, Avya
Published: (2008)
Re-implement incentive mechanisms the global wireless village
by: Rawda, T S Aki
Published: (2015)
by: Rawda, T S Aki
Published: (2015)
Trustworthiness Measure for e-Service
by: Chang, Elizabeth, et al.
Published: (2005)
by: Chang, Elizabeth, et al.
Published: (2005)
A service concept recommendation system for enhancing the dependability of semantic service matchmakers in the service ecosystem environment
by: Dong, Hai, et al.
Published: (2010)
by: Dong, Hai, et al.
Published: (2010)
Similar Items
-
Pairing-based public-key encryption schemes with backward-and-forward security
by: Han, Song, et al.
Published: (2008) -
Human Resource Service Delivery: Achieving Operational Excellence and Cost Efficiency through
Human Resources Shared Services
by: Loh, Rice Li Na
Published: (2009) -
Generalized hash-binary-tree based self-healing key distribution with implicit authentication
by: Tian, Biming, et al.
Published: (2011) -
A key management scheme for heterogeneous sensor networks using keyed-hash chain
by: Tian, Biming, et al.
Published: (2009) -
Identifying barriers and improving communication between cancer service providers and Aboriginal patients and their families: the perspective of service providers
by: Shahid, Shaouli, et al.
Published: (2013)