Sciweavers

144 search results - page 19 / 29
» An Efficient Authentication Protocol for GSM
Sort
View
ICISC
2008
123views Cryptology» more  ICISC 2008»
13 years 10 months ago
The Swiss-Knife RFID Distance Bounding Protocol
Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicini...
Chong Hee Kim, Gildas Avoine, François Koeu...
ACIIDS
2009
IEEE
89views Database» more  ACIIDS 2009»
14 years 18 days ago
Improving Efficiency and Scalability of Service Network Graph by Re-routing Service Routes
Inter domain service routing is an element in the success of Next Generation Network. Service requests, such as the INVITE request in Session Initiation Protocol [21] may need to ...
David Lai, Zhongwei Zhang
IJISEC
2008
92views more  IJISEC 2008»
13 years 8 months ago
A coding approach to the multicast stream authentication problem
We study the multicast stream authentication problem when an opponent can drop, reorder and introduce data packets into the communication channel. In such a model, packet overhead...
Christophe Tartary, Huaxiong Wang, Josef Pieprzyk
BIOSIG
2009
152views Biometrics» more  BIOSIG 2009»
13 years 6 months ago
A Survey of Distributed Biometric Authentication Systems
: In ACISP'07, Bringer et al proposed a new approach for remote biometric based verification, which consists of a hybrid protocol that distributes the server side functionalit...
Neyire Deniz Sarier
PKC
2000
Springer
132views Cryptology» more  PKC 2000»
14 years 5 days ago
The Composite Discrete Logarithm and Secure Authentication
For the two last decades, electronic authentication has been an important topic. The first applications were digital signatures to mimic handwritten signatures for digital document...
David Pointcheval