Sciweavers

1018 search results - page 41 / 204
» Remote User Authentication Using Public Information
Sort
View
HCI
2007
13 years 10 months ago
Privacy Issues for the Disclosure of Emotions to Remote Acquaintances Without Simultaneous Communication
We discuss the privacy issues related to the design of systems that disclose information about emotions to remote acquaintances, without simultaneous communication: users do not ch...
Sébastien Duval, Christian Becker, Hiromich...
CODASPY
2012
12 years 5 months ago
Towards end-to-end secure content storage and delivery with public cloud
Recent years have witnessed the trend of leveraging cloudbased services for large scale content storage, processing, and distribution. Security and privacy are among top concerns ...
Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin W...
SWS
2006
ACM
14 years 3 months ago
Single sign-on for java web start applications using myproxy
Single sign-on is critical for the usability of distributed systems. While there are several authentication mechanisms which support single sign-on (e.g. Kerberos and X.509), it m...
Terry Fleury, Jim Basney, Von Welch
CRYPTO
2003
Springer
96views Cryptology» more  CRYPTO 2003»
14 years 2 months ago
Scalable Protocols for Authenticated Group Key Exchange
We consider the fundamental problem of authenticated group key exchange among n parties within a larger and insecure public network. A number of solutions to this problem have bee...
Jonathan Katz, Moti Yung
ASIACRYPT
2004
Springer
14 years 2 months ago
Constant-Round Authenticated Group Key Exchange for Dynamic Groups
Abstract. An authenticated group key exchange (AGKE) scheme allows a group of users in a public network to share a session key which may later be used to achieve desirable cryptogr...
Hyun-Jeong Kim, Su-Mi Lee, Dong Hoon Lee