Sciweavers

24529 search results - page 128 / 4906
» Computing on Authenticated Data
Sort
View
ISW
2004
Springer
15 years 7 months ago
Practical Authenticated Key Agreement Using Passwords
Due to the low entropy of human-memorable passwords, it is not easy to conduct password authenticated key agreement in a secure manner. Though there are many protocols achieving th...
Taekyoung Kwon
122
Voted
FGR
2002
IEEE
175views Biometrics» more  FGR 2002»
15 years 7 months ago
On Modeling Variations for Face Authentication
In this paper, we present a scheme for face authentication in the presence of variations. To deal with variations, such as facial expressions and registration errors, with which t...
Xiaoming Liu 0002, Tsuhan Chen, B. V. K. Vijaya Ku...
IH
1998
Springer
15 years 6 months ago
Biometric yet Privacy Protecting Person Authentication
Many eligibility or entitlement certificates in every day life are non-transferable between persons. However, they are usually implemented by personal physical tokens that owners c...
Gerrit Bleumer
CCS
2006
ACM
15 years 6 months ago
Deniable authentication and key exchange
We extend the definitional work of Dwork, Naor and Sahai from deniable authentication to deniable key-exchange protocols. We then use these definitions to prove the deniability fe...
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
CSREASAM
2008
15 years 4 months ago
Implementing Cryptography for Packet Level Authentication
Abstract--Packet Level Authentication (PLA) is a novel countermeasure against distributed denial-of-service attacks. Each packet sent across a network has a digital signature and p...
Billy Bob Brumley