Sciweavers

648 search results - page 43 / 130
» Authenticated hash tables
Sort
View
EUROCRYPT
2003
Springer
14 years 2 months ago
A Framework for Password-Based Authenticated Key Exchange
Abstract. In this paper we present a general framework for passwordbased authenticated key exchange protocols, in the common reference odel. Our protocol is actually an abstraction...
Rosario Gennaro, Yehuda Lindell
ICIAR
2004
Springer
14 years 2 months ago
A Secure and Localizing Watermarking Technique for Image Authentication
In this paper, a new block-based image-dependent watermarking technique is proposed. The proposed technique utilizes the correlation coefficient statistic to produce a short and un...
Abdelkader H. Ouda, Mahmoud R. El-Sakka
AMC
2005
131views more  AMC 2005»
13 years 8 months ago
A user friendly remote authentication scheme with smart cards against impersonation attacks
In 2000, Sun proposed an efficient remote user authentication scheme using smart cards without requiring a password table. However, the password of a user is an un-human lengthy p...
Chien-Lung Hsu
PERCOM
2006
ACM
14 years 8 months ago
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
Security and privacy in RFID systems is an important and active research area. A number of challenges arise due to the extremely limited computational, storage and communication a...
Gene Tsudik
P2P
2009
IEEE
114views Communications» more  P2P 2009»
14 years 3 months ago
Why Kad Lookup Fails
A Distributed Hash Table (DHT) is a structured overlay network service that provides a decentralized lookup for mapping objects to locations. In this paper, we study the lookup pe...
Hun Jeong Kang, Eric Chan-Tin, Nicholas Hopper, Yo...