Sciweavers

232 search results - page 14 / 47
» On the use of one-way chain based authentication protocols i...
Sort
View
FC
2000
Springer
83views Cryptology» more  FC 2000»
14 years 1 days ago
Secret Key Authentication with Software-Only Verification
Abstract Two protocols for authentication based on symmetric key cryptography are described, where the verifier can be implemented in software completely, without the need for secu...
Jaap-Henk Hoepman
NDSS
2000
IEEE
14 years 24 days ago
Secure Border Gateway Protocol (S-BGP) - Real World Performance and Deployment Issues
The Border Gateway Protocol (BGP), which is used to distribute routing information between autonomous systems, is an important component of the Internet’s routing infrastructure...
Stephen T. Kent, Charles Lynn, Joanne Mikkelson, K...
PERVASIVE
2004
Springer
14 years 1 months ago
eSeal - A System for Enhanced Electronic Assertion of Authenticity and Integrity
Ensuring authenticity and integrity are important tasks when dealing with goods. While in the past seal wax was used to ensure the integrity, electronic devices are now able to tak...
Christian Decker, Michael Beigl, Albert Krohn, Phi...
PERCOM
2007
ACM
14 years 8 months ago
Physically Unclonable Function-Based Security and Privacy in RFID Systems
Radio Frequency Identification (RFID) is an increasingly popular technology that uses radio signals for object identification. Tracking and authentication in RFID tags have raised...
Leonid Bolotnyy, Gabriel Robins
ACSAC
1999
IEEE
14 years 23 days ago
A Distributed Certificate Management System (DCMS) Supporting Group-Based Access Controls
Mainly for scalability reasons, many cryptographic security protocols make use of public key cryptography and require the existence of a corresponding public key infrastructure (P...
Rolf Oppliger, Andreas Greulich, Peter Trachsel