Sciweavers

2261 search results - page 4 / 453
» Dynamic types for authentication
Sort
View
CONCUR
2005
Springer
15 years 8 months ago
Timed Spi-Calculus with Types for Secrecy and Authenticity
Abstract. We present a discretely timed spi-calculus. A primitive for key compromise allows us to model key compromise attacks, thus going beyond the standard Dolev–Yao attacker ...
Christian Haack, Alan Jeffrey
115
Voted
PERVASIVE
2007
Springer
15 years 8 months ago
Shake Well Before Use: Authentication Based on Accelerometer Data
Abstract. Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented...
Rene Mayrhofer, Hans Gellersen
ICBA
2004
Springer
123views Biometrics» more  ICBA 2004»
15 years 7 months ago
User Authentication through Typing Biometrics Features
Lívia C. F. Araújo, Luiz H. R. Sucup...
98
Voted
ACSAC
1999
IEEE
15 years 6 months ago
Using Checkable Types in Automatic Protocol Analysis
The Automatic Authentication Protocol Analyzer, 2nd Version AAPA2 is a fast, completely automatic tool for formally analyzing cryptographic protocols. It correctly identi es vulne...
Stephen H. Brackin
ACNS
2003
Springer
123views Cryptology» more  ACNS 2003»
15 years 7 months ago
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards
Abstract. The use of biometrics, and fingerprint recognition in particular, for cardholder authentication in smartcard systems is growing in popularity, and such systems are the f...
Luciano Rila, Chris J. Mitchell