Sciweavers

1018 search results - page 5 / 204
» Remote User Authentication Using Public Information
Sort
View
AINA
2004
IEEE
13 years 10 months ago
Using IC Cards to Remotely Login Passwords without Verification Tables
A new remote password authentication scheme based on IC cards is proposed in this paper. By using the scheme, a remote password can be authenticated without either a password file...
Ching-Te Wang, Chin-Chen Chang, Chu-Hsing Lin
EUROMED
2010
13 years 5 months ago
Scotlandsplaces: Accessing Remote Digital Heritage Datasets Using Web Services
The ScotlandsPlaces project is an official, permanent website found at www.scotlandsplaces.gov.uk. It exhibits a very novel and exciting way of searching across cultural heritage i...
Ashley Beamer, Mark Gillick
IJNSEC
2008
143views more  IJNSEC 2008»
13 years 7 months ago
New Cryptanalysis Paradigm on a Nonce-based Mutual Authentication Scheme
In 2005, Lee, Kim, and Yoo proposed a nonce-based mutual authentication scheme using smart cards. However, this paper demonstrates that Lee-Kim-Yoo's scheme is vulnerable to ...
Da-Zhi Sun, Zhen-Fu Cao
JCIT
2010
189views more  JCIT 2010»
13 years 1 months ago
Weaknesses of a Secure Dynamic ID Based Remote User Authentication Scheme
In 2009, Liao and Wang proposed a secure dynamic ID based remote user authentication scheme for multi-server environments. They achieved user anonymity by using secure dynamic IDs...
Bae-Ling Chen, Wen-Chung Kuo, Yu-Shuan Chu
WOWMOM
2006
ACM
119views Multimedia» more  WOWMOM 2006»
14 years 28 days ago
Credentials and Beliefs in Remote Trusted Platforms Attestation
— Remote attestation in trusted computing is about the ability of a local platform to authenticate the hardware and the software stack running on a remote trusted platform. We sa...
Andrea Bottoni, Gianluca Dini, Evangelos Kranakis