Sciweavers

1116 search results - page 82 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
ICISS
2007
Springer
13 years 12 months ago
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks
Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper pr...
Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mo...
ECIS
2000
13 years 9 months ago
Authentic Intervention in Information Systems Practice
In this paper the philosophical concept of authenticity is used as a framing device for providing an interpretation of aspects of both ethical and practical action on the part of i...
Robert A. Stephens, Stephen K. Probert
IFIP
2004
Springer
14 years 1 months ago
Static program transformations for efficient software model checking
Ensuring correctness of software by formal methods is a very relevant and widely studied problem. Automatic verification of software using model checkers from the state space exp...
Shobha Vasudevan, Jacob A. Abraham
CSREASAM
2009
13 years 5 months ago
A Secure Certificate for Secure Group Communication
- Security is a primary concern in group communication, and secure authentication is essential to establishing a secure group communication. Most conventional authentications consi...
Sunghyuck Hong
AINA
2005
IEEE
14 years 1 months ago
Authenticated Encryption Schemes with Message Linkage for Threshold Signatures
Based on the factorization problem, a modified (t, n) threshold group-oriented scheme with message recovery is proposed. In the proposed scheme, any combination of more than t mem...
Chi-Hsiung Huang, Chia-Yin Lee, Chu-Hsing Lin, Chi...