Sciweavers

609 search results - page 28 / 122
» One-Time-Password-Authenticated Key Exchange
Sort
View
131
Voted
HICSS
2006
IEEE
118views Biometrics» more  HICSS 2006»
15 years 10 months ago
Information Quality as a Common Ground for Key Players in e-Government Integration and Interoperability
Whereas computer-supported sharing of information is a core issue of e-Government integration and interoperation, the key players involved hardly find any guidance how to settle f...
Ralf Klischewski, Hans Jochen Scholl
CIS
2005
Springer
15 years 10 months ago
On the Security of Some Password-Based Key Agreement Schemes
In this paper we show that two potential security vulnerabilities exist in the strong password-only authenticated key exchange scheme due to Jablon. Two standardised schemes based...
Qiang Tang, Chris J. Mitchell
IH
2009
Springer
15 years 11 months ago
Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions
Abstract. A physically unclonable function (PUF) is a multiple-input, multipleoutput, large entropy physical system that is unreproducible due to its structural complexity. A publi...
Nathan Beckmann, Miodrag Potkonjak
ICDT
2007
ACM
133views Database» more  ICDT 2007»
15 years 10 months ago
XML Schema Mappings in the Presence of Key Constraints and Value Dependencies
Abstract. Schema mappings play a central role in both data integration and data exchange, and are understood as high-level specifications describing the relationships between data...
Tadeusz Pankowski, Jolanta Cybulka, Adam Meissner
DRM
2003
Springer
15 years 9 months ago
Breaking and repairing optimistic fair exchange from PODC 2003
In PODC 2003, Park, Chong, Siegel and Ray [22] proposed an optimistic protocol for fair exchange, based on RSA signatures. We show that their protocol is totally breakable already...
Yevgeniy Dodis, Leonid Reyzin