Sciweavers

318 search results - page 26 / 64
» A New Family of Authentication Protocols
Sort
View
EUROPKI
2004
Springer
14 years 3 months ago
Threshold Password-Based Authentication Using Bilinear Pairings
We present a new threshold password-based authentication protocol that allows a roaming user(a user who accesses a network from different client terminals) to download a private k...
Songwon Lee, Kyusuk Han, Seok-kyu Kang, Kwangjo Ki...
ISW
2004
Springer
14 years 3 months ago
Practical Authenticated Key Agreement Using Passwords
Due to the low entropy of human-memorable passwords, it is not easy to conduct password authenticated key agreement in a secure manner. Though there are many protocols achieving th...
Taekyoung Kwon
TCOS
2010
13 years 4 months ago
J-PAKE: Authenticated Key Exchange without PKI
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication be...
Feng Hao, Peter Ryan
PAMI
2007
121views more  PAMI 2007»
13 years 9 months ago
Person Authentication Using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation
— In this paper, we investigate the use of brain activity for person authentication. It has been shown in previous studies that the brain-wave pattern of every individual is uniq...
Sébastien Marcel, José del R. Mill&a...
ACSAC
2009
IEEE
14 years 4 months ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans