Sciweavers

11 search results - page 2 / 3
» Secret Key Authentication with Software-Only Verification
Sort
View
AINA
2004
IEEE
13 years 11 months ago
Using IC Cards to Remotely Login Passwords without Verification Tables
A new remote password authentication scheme based on IC cards is proposed in this paper. By using the scheme, a remote password can be authenticated without either a password file...
Ching-Te Wang, Chin-Chen Chang, Chu-Hsing Lin
ICCSA
2007
Springer
14 years 1 months ago
An Enhanced One-Round Pairing-Based Tripartite Authenticated Key Agreement Protocol
A tripartite authenticated key agreement protocol is generally designed to accommodate the need of three specific entities in communicating over an open network with a shared secre...
Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae L...
CRYPTO
2008
Springer
100views Cryptology» more  CRYPTO 2008»
13 years 9 months ago
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
Abstract. This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on universal hash functions. The attacks use a substantial number of verif...
Helena Handschuh, Bart Preneel
ISCC
2008
IEEE
143views Communications» more  ISCC 2008»
14 years 1 months ago
SSMS - A secure SMS messaging protocol for the m-payment systems
The GSM network with the greatest worldwide number of users, succumbs to several security vulnerabilities. The Short Message Service (SMS) is one of its superior and well-tried se...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
ICC
2009
IEEE
174views Communications» more  ICC 2009»
14 years 2 months ago
Biometric Mobile Template Protection: A Composite Feature Based Fingerprint Fuzzy Vault
—Biometric authentication is emerging as the promising solution to conventional cryptography based authentication technologies. However, protecting users’ biometric templates s...
Kai Xi, Jiankun Hu