Sciweavers

1150 search results - page 63 / 230
» Beacon Based Authentication
Sort
View
MTA
2007
82views more  MTA 2007»
13 years 8 months ago
A scalable signature scheme for video authentication
This paper addresses the problem of ensuring the integrity of a digital video and presents a scalable signature scheme for video authentication based on cryptographic secret sharin...
Pradeep K. Atrey, Wei-Qi Yan, Mohan S. Kankanhalli
TNC
2004
96views Education» more  TNC 2004»
13 years 10 months ago
A Roaming Authentication Solution for WiFi Using IPSec VPNs With Client Certificates
Several solutions have been proposed to provide authentication and safe encryption for Wifi networks in order to overcome the limitation of WEP based security. This document descr...
Carlos Ribeiro, Fernando Silva, Andre Zuquete
SPW
2005
Springer
14 years 2 months ago
Implementing a Multi-hat PDA
We describe our work in progress aimed at implementing a multi-hat PDA. Our current prototype is based on SELinux and KDE and accepts a proximity token, in the form of a Bluetooth ...
Matthew Johnson
FSE
2003
Springer
135views Cryptology» more  FSE 2003»
14 years 2 months ago
New Attacks against Standardized MACs
In this paper, we revisit the security of several message authentication code (MAC) algorithms based on block ciphers, when instantiated with 64-bit block ciphers such as DES. We e...
Antoine Joux, Guillaume Poupard, Jacques Stern
CHI
2010
ACM
14 years 3 months ago
ColorPIN: securing PIN entry through indirect input
Automated teller machine (ATM) frauds are increasing drastically these days. When analyzing the most common attacks and the reasons for successful frauds, it becomes apparent that...
Alexander De Luca, Katja Hertzschuch, Heinrich Hus...