Sciweavers

122 search results - page 14 / 25
» Authentication and Delegation with Smart-cards
Sort
View
MOBICOM
1996
ACM
13 years 11 months ago
Security on the Move: Indirect Authentication using Kerberos
Even as mobile computing and network computing are gaining momentum, Internet security is sharing the spotlight. Security and authentication on open networks is already a difficul...
Armando Fox, Steven D. Gribble
IPTPS
2004
Springer
14 years 28 days ago
Peer-to-Peer Authentication with a Distributed Single Sign-On Service
Abstract. CorSSO is a distributed service for authentication in networks. It allows application servers to delegate client identity checking to combinations of authentication serve...
William K. Josephson, Emin Gün Sirer, Fred B....
AVBPA
2005
Springer
282views Biometrics» more  AVBPA 2005»
14 years 1 months ago
Secure Fingerprint Matching with External Registration
Biometrics-based authentication systems offer enhanced security and user convenience compared to traditional token-based (e.g., ID card) and knowledge-based (e.g., password) system...
James Reisman, Umut Uludag, Arun Ross
CARDIS
2000
Springer
150views Hardware» more  CARDIS 2000»
13 years 12 months ago
How to Turn a GSM SIM into a Web Server
: We describe the WebSIM, an approach that integrates GSM SIMs into the Internet. The underlying idea is to implement a Web Server inside a SIM, and to allow for transparent access...
Scott B. Guthery, Roger Kehr, Joachim Posegga
IACR
2011
292views more  IACR 2011»
12 years 7 months ago
Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones
—Contactless technology is widely used in security sensitive applications, including identification, payment and access-control systems. Near Field Communication (NFC) is a shor...
Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Ko...