We extend the definitional work of Dwork, Naor and Sahai from deniable authentication to deniable key-exchange protocols. We then use these definitions to prove the deniability fe...
This paper presents a detailed review of remote user authentication schemes with smart cards based on bilinear pairings. The first scheme regarding this was proposed by Manik et a...
- In the paper, we propose an efficient two-factor localized authentication scheme suitable for WLAN roaming. The proposed authentication scheme can greatly improve the security co...
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
To allow for an efficient usage of a device in pervasive computing environments, reliable and yet convenient user access is an important requirement. The problem becomes more comp...