Sciweavers

503 search results - page 8 / 101
» Authenticity by tagging and typing
Sort
View
JCS
2011
55views more  JCS 2011»
13 years 2 months ago
Tree-based HB protocols for privacy-preserving authentication of RFID tags
Tzipora Halevi, Nitesh Saxena, Shai Halevi
ISPEC
2010
Springer
13 years 9 months ago
Certificateless KEM and Hybrid Signcryption Schemes Revisited
Often authentication and confidentiality are required as simultaneous key requirements in many cryptographic applications. The cryptographic primitive called signcryption effective...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
ADC
2009
Springer
163views Database» more  ADC 2009»
14 years 2 months ago
ActiveTags: Making Tags More Useful Anywhere on the Web
Tags in social tagging systems store meaning for the taggers who have entered them, and other users often share this understanding. The result of this, a folksonomy, is typically ...
Stephan Hagemann, Gottfried Vossen
PERCOM
2007
ACM
14 years 7 months ago
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking...
Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. ...
CTRSA
2008
Springer
113views Cryptology» more  CTRSA 2008»
13 years 9 months ago
Aggregate Message Authentication Codes
We propose and investigate the notion of aggregate message authentication codes (MACs) which have the property that multiple MAC tags, computed by (possibly) different senders on ...
Jonathan Katz, Andrew Y. Lindell