Sciweavers

1150 search results - page 85 / 230
» Beacon Based Authentication
Sort
View
ASIACRYPT
2006
Springer
14 years 19 days ago
A Scalable Password-Based Group Key Exchange Protocol in the Standard Model
This paper presents a secure constant-round password-based group key exchange protocol in the common reference string model. Our protocol is based on the group key exchange protoco...
Michel Abdalla, David Pointcheval
CANS
2009
Springer
160views Cryptology» more  CANS 2009»
14 years 3 months ago
Short Hash-Based Signatures for Wireless Sensor Networks
We present a hash-based signature scheme customized for wireless sensor networks. For message lengths required by instructions or queries from the base station or single measuremen...
Erik Dahmen, Christoph Krauß
HICSS
2005
IEEE
148views Biometrics» more  HICSS 2005»
14 years 2 months ago
Public-Key-Infrastructure Based on a Peer-to-Peer Network
The goal of a Public-Key-Infrastructure (PKI) is to prove whether a cryptographic public key is authentic for a certain user. This information is crucial for the reliability of as...
Thomas Wölfl
AVBPA
2005
Springer
288views Biometrics» more  AVBPA 2005»
14 years 2 months ago
Addressing the Vulnerabilities of Likelihood-Ratio-Based Face Verification
Abstract. Anti-spoofing protection of biometric systems is always a serious issue in real-life applications of an automatic personal verification system. Despite the fact that face...
Krzysztof Kryszczuk, Andrzej Drygajlo
ISW
2000
Springer
14 years 14 days ago
A Signcryption Scheme Based on Integer Factorization
Abstract. Signcryption is a public-key cryptographic primitive introduced by Zheng, which achieves both message confidentiality and nonrepudiatable origin authenticity, at a lower ...
Ron Steinfeld, Yuliang Zheng