Sciweavers

1018 search results - page 19 / 204
» Remote User Authentication Using Public Information
Sort
View
JCS
2011
126views more  JCS 2011»
14 years 9 months ago
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
One of the main challenges in pervasive computing is how we can establish secure communication over an untrusted high-bandwidth network without any initial knowledge or a Public K...
L. H. Nguyen, A. W. Roscoe
NDSS
2003
IEEE
15 years 7 months ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the serverâ...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
SOUPS
2009
ACM
15 years 8 months ago
Look into my eyes!: can you guess my password?
Authentication systems for public terminals – and thus public spaces – have to be fast, easy and secure. Security is of utmost importance since the public setting allows manif...
Alexander De Luca, Martin Denzel, Heinrich Hussman...
ACSAC
2009
IEEE
15 years 9 months ago
Privacy through Noise: A Design Space for Private Identification
To protect privacy in large systems, users must be able to authenticate against a central server without disclosing their identity to the network. Private identification protocols ...
Karsten Nohl, David Evans
109
Voted
KES
2006
Springer
15 years 2 months ago
Interaction Between Small Size Device and Large Screen in Public Space
We propose a simple way to interact with a large screen which is situated in a public space by using a small size device. In order to get the connection information easily, we use ...
Chunming Jin, Shin Takahashi, Jiro Tanaka