Sciweavers

361 search results - page 5 / 73
» Composition of Password-Based Protocols
Sort
View
EUROCRYPT
2011
Springer
13 years 2 days ago
Concurrent Composition in the Bounded Quantum Storage Model
We define the BQS-UC model, a variant of the UC model, that deals with protocols in the bounded quantum storage model. We present a statistically secure commitment protocol in th...
Dominique Unruh
DOCENG
2009
ACM
13 years 6 months ago
A REST protocol and composite format for interactive web documents
John M. Boyer, Charles Wiecha, Rahul P. Akolkar
ICDCSW
2009
IEEE
13 years 6 months ago
Automated Service Composition in Next-Generation Networks
Dynamic composition of protocol features allows applications to establish connections with custom communication characteristics. Automatically computing possible compositions and ...
Shashank Shanbhag, Xin Huang, Santosh Proddatoori,...
ICMCS
2005
IEEE
296views Multimedia» more  ICMCS 2005»
14 years 2 months ago
An Association-Based Graphical Password Design Resistant to Shoulder-Surfing Attack
In line with the recent call for technology on Image Based Authentication (IBA) in JPEG committee [1], we present a novel graphical password design in this paper. It rests on the ...
Zhi Li, Qibin Sun, Yong Lian, Daniele D. Giusto
RFIDSEC
2010
13 years 3 months ago
EC-RAC: Enriching a Capacious RFID Attack Collection
Abstract. We demonstrate two classes of attacks on EC-RAC, a growing set of RFID protocols. Our first class of attacks concerns the compositional approach used to construct a parti...
Ton van Deursen, Sasa Radomirovic