Sciweavers

103 search results - page 9 / 21
» A password authentication scheme over insecure networks
Sort
View
ESAS
2007
Springer
14 years 10 days ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
ICMCS
2005
IEEE
71views Multimedia» more  ICMCS 2005»
14 years 2 months ago
A proposal of butterfly-graph based stream authentication over lossy networks
In this paper, we propose a butterfly-graph based stream authentication scheme for lossy networks where the streaming packets could be lost in both random and burst ways. Due to t...
Zhishou Zhang, Qibin Sun, Wai-Choong Wong
ICMCS
2006
IEEE
149views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Authenticating Multimedia Transmitted Over Wireless Networks: A Content-Aware Stream-Level Approach
We propose in this paper a novel content-aware stream-level approach to authenticating multimedia data transmitted over wireless networks. The proposed approach is fundamentally d...
Zhi Li, Yong Lian, Qibin Sun, Chang Chen
CSI
2007
192views more  CSI 2007»
13 years 8 months ago
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
In 2002, Chien et al. proposed an efficient remote authentication scheme using smart cards, in which only few hashing operations are required. Later, Ku et al. gave an improved sc...
Xiaomin Wang, Wenfang Zhang, Jiashu Zhang, Muhamma...
FC
2005
Springer
110views Cryptology» more  FC 2005»
14 years 1 months ago
Approximate Message Authentication and Biometric Entity Authentication
Approximate Message Authentication Code (AMAC) is a recently introduced cryptographic primitive with several applications in the areas of cryptography and coding theory. Briefly s...
Giovanni Di Crescenzo, R. F. Graveman, Renwei Ge, ...