Sciweavers

315 search results - page 8 / 63
» Number Theoretic Attacks on Secure Password Schemes
Sort
View
GLOBECOM
2007
IEEE
14 years 1 months ago
An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks
—Over the last few years, many researchers have paid a lot of attention to the user authentication problem. However, to date, there has been relatively little research suited for...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang
ASIACRYPT
2009
Springer
14 years 2 months ago
Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices
Abstract. We describe a public-key encryption scheme based on lattices — specifically, based on the hardness of the learning with error (LWE) problem — that is secure against ...
Jonathan Katz, Vinod Vaikuntanathan
COMCOM
2008
82views more  COMCOM 2008»
13 years 7 months ago
Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing
People enjoy the convenience of on-line services, Automated Teller Machines (ATMs), and pervasive computing, but online environments, ATMs, and pervasive computing may bring many r...
Ming Lei, Yang Xiao, Susan V. Vrbsky, Chung-Chih L...
GLOBECOM
2007
IEEE
14 years 1 months ago
Addressing the Weakness in a Lightweight RFID Tag-Reader Mutual Authentication Scheme
— A lightweight radio frequency identification (RFID) tag-reader mutual authentication scheme was recently proposed as an improvement over the original authentication protocol s...
Tong-Lee Lim, Tieyan Li
CHI
2008
ACM
14 years 8 months ago
Undercover: authentication usable in front of prying eyes
A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the des...
Hirokazu Sasamoto, Nicolas Christin, Eiji Hayashi