Sciweavers

154 search results - page 7 / 31
» A Secure YS-Like User Authentication Scheme
Sort
View
CSREASAM
2008
13 years 9 months ago
Password Entry Scheme Resistant to Eavesdropping
- We propose an authentication scheme resistant to eavesdropping attacks. Users select an alphanumeric password with a length of 9-15 symbols. They can use this password in the tra...
Bogdan Hoanca, Kenrick J. Mock
MMSEC
2005
ACM
113views Multimedia» more  MMSEC 2005»
14 years 1 months ago
A secure biometric authentication scheme based on robust hashing
In this paper, we propose a secure biometric based authentication scheme which fundamentally relies on the use of a robust hash function. The robust hash function is a one-way tra...
Yagiz Sutcu, Husrev T. Sencar, Nasir D. Memon
INFORMATICALT
2008
105views more  INFORMATICALT 2008»
13 years 7 months ago
Public Key Authentication Schemes for Local Area Networks
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang
SP
2006
IEEE
143views Security Privacy» more  SP 2006»
14 years 1 months ago
Cognitive Authentication Schemes Safe Against Spyware (Short Paper)
Can we secure user authentication against eavesdropping adversaries, relying on human cognitive functions alone, unassisted by any external computational device? To accomplish thi...
Daphna Weinshall
WMASH
2003
ACM
14 years 20 days ago
Secure authentication system for public WLAN roaming
A serious challenge for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relat...
Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuk...