Sciweavers

252 search results - page 30 / 51
» On Robust Key Agreement Based on Public Key Authentication
Sort
View
ICASSP
2008
IEEE
14 years 2 months ago
Audio authentication based on distributed source coding
Audio authentication is important in content delivery via untrusted intermediaries, for example peer-to-peer (P2P) file sharing. Many differently encoded versions of the original...
David P. Varodayan, Yao-Chung Lin, Bernd Girod
JCP
2007
103views more  JCP 2007»
13 years 7 months ago
Conformance Testing a Set of Criteria for Assessing Trust
—The ability to authenticate the identity of an entity in an open and insecure environment such as the Internet plays an important role in reducing potential threats and Public k...
Omar Batarfi, Lindsay Marshall
PERCOM
2008
ACM
14 years 7 months ago
Towards Robust Low Cost Authentication for Pervasive Devices
Low cost devices such as RFIDs, sensor network nodes, and smartcards are crucial for building the next generation pervasive and ubiquitous networks. The inherent power and footpri...
Erdinç Öztürk, Ghaith Hammouri, B...
PET
2010
Springer
13 years 12 months ago
Anonymous Webs of Trust
Abstract. Webs of trust constitute a decentralized infrastructure for establishing the authenticity of the binding between public keys and users and, more generally, trust relation...
Michael Backes, Stefan Lorenz, Matteo Maffei, Kim ...
SPW
2004
Springer
14 years 1 months ago
BLIND: A Complete Identity Protection Framework for End-Points
In this paper, we present a security framework that provides identity protection against active and passive attacks for end-points. The framework is based on a two-round-trip authe...
Jukka Ylitalo, Pekka Nikander