Sciweavers

24529 search results - page 77 / 4906
» Computing on Authenticated Data
Sort
View
CTRSA
2003
Springer
114views Cryptology» more  CTRSA 2003»
15 years 7 months ago
Fractal Merkle Tree Representation and Traversal
We introduce a technique for traversal of Merkle trees, and propose an efficient algorithm that generates a sequence of leaves along with their associated authentication paths. For...
Markus Jakobsson, Frank Thomson Leighton, Silvio M...
NSDI
2008
15 years 4 months ago
A User Study Design for Comparing the Security of Registration Protocols
We present the design of a user study for comparing the security of two registration mechanisms for initializing credentials in machine authentication protocols, such as SiteKey. ...
Chris Karlof, J. Doug Tygar, David Wagner
85
Voted
CHI
2008
ACM
16 years 2 months ago
Eyepass - eye-stroke authentication for public terminals
Alexander De Luca, Heinrich Hußmann, Roman W...
FOCS
2002
IEEE
15 years 7 months ago
Authentication of Quantum Messages
Howard Barnum, Claude Crépeau, Daniel Gotte...
CIS
2006
Springer
15 years 6 months ago
Security and Privacy on Authentication Protocol for Low-Cost RFID
Yong-Zhen Li, Young-Bok Cho, Nam-Kyoung Um, Sang H...