Sciweavers

1116 search results - page 54 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
ACNS
2005
Springer
88views Cryptology» more  ACNS 2005»
14 years 1 months ago
Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks
Passwords are one of the most common cause of system break-ins, because the low entropy of passwords makes systems vulnerable to brute force guessing attacks (dictionary attacks). ...
Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwo...
ISW
2010
Springer
13 years 6 months ago
Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents
We analyze the Extended Access Control (EAC) protocol for authenticated key agreement, recently proposed by the German Federal Office for Information Security (BSI) for the deploym...
Özgür Dagdelen, Marc Fischlin
ICC
2007
IEEE
125views Communications» more  ICC 2007»
14 years 2 months ago
SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography
In a wireless network composed of multiple access points, a long delay during roaming from one access point to another may cause a disruption for streaming traffic. Roaming in wire...
Yoohwan Kim, Wei Ren, Ju-Yeon Jo, Yingtao Jiang, J...
APNOMS
2006
Springer
13 years 12 months ago
An Efficient Authentication and Simplified Certificate Status Management for Personal Area Networks
Abstract. Recently the concept of personal PKI was introduced to describe a public key infrastructure specifically designed to support the distribution of public keys in a personal...
Chul Sur, Kyung Hyune Rhee
WS
2004
ACM
14 years 1 months ago
Analysis of the 802.11i 4-way handshake
802.11i is an IEEE standard designed to provide enhanced MAC security in wireless networks. The authentication process involves three entities: the supplicant (wireless device), t...
Changhua He, John C. Mitchell