Sciweavers

1018 search results - page 45 / 204
» Remote User Authentication Using Public Information
Sort
View
ACSAC
2007
IEEE
14 years 3 months ago
SSARES: Secure Searchable Automated Remote Email Storage
The increasing centralization of networked services places user data at considerable risk. For example, many users store email on remote servers rather than on their local disk. D...
Adam J. Aviv, Michael E. Locasto, Shaya Potter, An...
TMC
2012
11 years 11 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
SAC
2004
ACM
14 years 2 months ago
Trust enhanced ubiquitous payment without too much privacy loss
Computational models of trust have been proposed for use in ubicomp environments for deciding whether to allow customers to pay with an e-purse or not. In order to build trust in ...
Jean-Marc Seigneur, Christian Damsgaard Jensen
CHI
2009
ACM
14 years 10 months ago
Exploring the potential of audio-tactile messaging for remote interpersonal communication
Shake2Talk is a mobile messaging system that allows users to send sounds and tactile sensations to one another via their mobile phones. Messages are created through gestures and t...
Lorna M. Brown, Abigail Sellen, Renan Krishna, Ric...
ASIACRYPT
2001
Springer
14 years 29 days ago
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank
A Zero-knowledge protocol provides provably secure entity authentication based on a hard computational problem. Among many schemes proposed since 1984, the most practical rely on f...
Nicolas Courtois