Sciweavers

24529 search results - page 77 / 4906
» Computing on Authenticated Data
Sort
View
CTRSA
2003
Springer
114views Cryptology» more  CTRSA 2003»
14 years 3 months ago
Fractal Merkle Tree Representation and Traversal
We introduce a technique for traversal of Merkle trees, and propose an efficient algorithm that generates a sequence of leaves along with their associated authentication paths. For...
Markus Jakobsson, Frank Thomson Leighton, Silvio M...
NSDI
2008
14 years 10 days ago
A User Study Design for Comparing the Security of Registration Protocols
We present the design of a user study for comparing the security of two registration mechanisms for initializing credentials in machine authentication protocols, such as SiteKey. ...
Chris Karlof, J. Doug Tygar, David Wagner
CHI
2008
ACM
14 years 10 months ago
Eyepass - eye-stroke authentication for public terminals
Alexander De Luca, Heinrich Hußmann, Roman W...
FOCS
2002
IEEE
14 years 3 months ago
Authentication of Quantum Messages
Howard Barnum, Claude Crépeau, Daniel Gotte...
CIS
2006
Springer
14 years 1 months ago
Security and Privacy on Authentication Protocol for Low-Cost RFID
Yong-Zhen Li, Young-Bok Cho, Nam-Kyoung Um, Sang H...