Sciweavers

154 search results - page 22 / 31
» A Secure YS-Like User Authentication Scheme
Sort
View
BIOSIG
2008
159views Biometrics» more  BIOSIG 2008»
14 years 9 days ago
Template Protection for PCA-LDA-based 3D Face Recognition Systems
: Authentication based on biometrics became significantly important over the last years. Privacy and security concerns arise by the extensive deployment of biometrics. The used bio...
Daniel Hartung
PROVSEC
2010
Springer
13 years 8 months ago
Identity Based Public Verifiable Signcryption Scheme
Abstract. Signcryption as a single cryptographic primitive offers both confidentiality and authentication simultaneously. Generally in signcryption schemes, the message is hidden a...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
PKC
2004
Springer
160views Cryptology» more  PKC 2004»
14 years 4 months ago
Constant Round Authenticated Group Key Agreement via Distributed Computation
Abstract. A group key agreement protocol allows a set of users, communicating over a public network, to agree on a private session key. Most of the schemes proposed so far require ...
Emmanuel Bresson, Dario Catalano
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
14 years 5 months ago
PPAA: Peer-to-Peer Anonymous Authentication
In the pursuit of authentication schemes that balance user privacy and accountability, numerous anonymous credential systems have been constructed. However, existing systems assume...
Patrick P. Tsang, Sean W. Smith
SWS
2006
ACM
14 years 4 months ago
Single sign-on for java web start applications using myproxy
Single sign-on is critical for the usability of distributed systems. While there are several authentication mechanisms which support single sign-on (e.g. Kerberos and X.509), it m...
Terry Fleury, Jim Basney, Von Welch