Sciweavers

MADNES
2005
Springer

Panel: Authentication in Constrained Environments

14 years 5 months ago
Panel: Authentication in Constrained Environments
Abstract. This paper contains the summary of a panel on authentication in constrained environments held during the Secure MADNES’05 Workshop. These were transcribed from hand-written notes. Mike Burmester (M. B.): We are having a talk here, on the topic of authentication on constrained environments. The panelists could take it into any direction they find interesting. I chose this topic because it is almost impossible to achieve authentication in ad-hoc settings. (After this opening, M. B. introduces the speakers to the audience filling the room.) Virgil Gligor (V. G.): So, I will try to be respectful to the topic. I will mention several topics that are related to the main topic. First primitive: Authenticated encryption. Involves 1-pass through data, requiring block cipher computation plus redundancy check. No extra work is required, only the block cipher. This is the most efficient approach. If authentication fails, then encryption fails with high probability. Note that 1-pass au...
Mike Burmester, Virgil D. Gligor, Evangelos Kranak
Added 28 Jun 2010
Updated 28 Jun 2010
Type Conference
Year 2005
Where MADNES
Authors Mike Burmester, Virgil D. Gligor, Evangelos Kranakis, J. D. Tygar, Yuliang Zheng
Comments (0)