Sciweavers

609 search results - page 28 / 122
» One-Time-Password-Authenticated Key Exchange
Sort
View
HICSS
2006
IEEE
118views Biometrics» more  HICSS 2006»
14 years 4 months ago
Information Quality as a Common Ground for Key Players in e-Government Integration and Interoperability
Whereas computer-supported sharing of information is a core issue of e-Government integration and interoperation, the key players involved hardly find any guidance how to settle f...
Ralf Klischewski, Hans Jochen Scholl
CIS
2005
Springer
14 years 3 months ago
On the Security of Some Password-Based Key Agreement Schemes
In this paper we show that two potential security vulnerabilities exist in the strong password-only authenticated key exchange scheme due to Jablon. Two standardised schemes based...
Qiang Tang, Chris J. Mitchell
IH
2009
Springer
14 years 4 months ago
Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions
Abstract. A physically unclonable function (PUF) is a multiple-input, multipleoutput, large entropy physical system that is unreproducible due to its structural complexity. A publi...
Nathan Beckmann, Miodrag Potkonjak
ICDT
2007
ACM
133views Database» more  ICDT 2007»
14 years 4 months ago
XML Schema Mappings in the Presence of Key Constraints and Value Dependencies
Abstract. Schema mappings play a central role in both data integration and data exchange, and are understood as high-level specifications describing the relationships between data...
Tadeusz Pankowski, Jolanta Cybulka, Adam Meissner
DRM
2003
Springer
14 years 3 months ago
Breaking and repairing optimistic fair exchange from PODC 2003
In PODC 2003, Park, Chong, Siegel and Ray [22] proposed an optimistic protocol for fair exchange, based on RSA signatures. We show that their protocol is totally breakable already...
Yevgeniy Dodis, Leonid Reyzin