Sciweavers

1054 search results - page 13 / 211
» Secret Communication with Feedback
Sort
View
119
Voted
TOG
2012
174views Communications» more  TOG 2012»
13 years 6 months ago
REVEL: tactile feedback technology for augmented reality
Olivier Bau, Ivan Poupyrev
ACNS
2006
Springer
121views Cryptology» more  ACNS 2006»
15 years 9 months ago
Authentication for Paranoids: Multi-party Secret Handshakes
In a society increasingly concerned with the steady assault on electronic privacy, the need for privacy-preserving techniques is both natural and justified. This need extends to t...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
153
Voted
SCN
2008
Springer
141views Communications» more  SCN 2008»
15 years 3 months ago
Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function
In 2004, Molnar and Wagner introduced a very appealing scheme dedicated to the identification of RFID tags. Their protocol relies on a binary tree of secrets which are shared
Julien Bringer, Hervé Chabanne, Thomas Icar...
139
Voted
TC
2010
15 years 2 months ago
Authenticated Group Key Transfer Protocol Based on Secret Sharing
—Key transfer protocols rely on a mutually trusted key generation center (KGC) to select session keys and transport session keys to all communication entities secretly. Most ofte...
Lein Harn, Changlu Lin
NDSS
2007
IEEE
15 years 10 months ago
Secret Handshakes with Dynamic and Fuzzy Matching
The need for communication privacy over public networks is of growing concern in today’s society. As a result, privacy-preserving authentication and key exchange protocols have ...
Giuseppe Ateniese, Jonathan Kirsch, Marina Blanton