Sciweavers

397 search results - page 15 / 80
» Secure Authentication Protocols Resistant to Guessing Attack...
Sort
View
CARDIS
2008
Springer
106views Hardware» more  CARDIS 2008»
13 years 9 months ago
Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource Devices
Abstract. In this paper we describe the first implementation on smartcard of the code-based authentication protocol proposed by Stern at Crypto'93 and we give a securization o...
Pierre-Louis Cayrel, Philippe Gaborit, Emmanuel Pr...
IJNSEC
2007
126views more  IJNSEC 2007»
13 years 7 months ago
Elliptic Curve Cryptography Based Wireless Authentication Protocol
Recently, Aydos et al. proposed an ECC-based wireless authentication protocol. Because their protocol is based on ECC, the protocol has significant advantage including lower comp...
Yongliang Liu, Wen Gao, Hongxun Yao, Xinghua Yu
CTRSA
2006
Springer
160views Cryptology» more  CTRSA 2006»
13 years 11 months ago
RFID-Tags for Anti-counterfeiting
RFID-tags are becoming very popular tools for identification of products. As they have a small microchip on board, they offer functionality that can be used for security purposes. ...
Pim Tuyls, Lejla Batina
ICMCS
2005
IEEE
95views Multimedia» more  ICMCS 2005»
14 years 1 months ago
On The Security of Mesh-Based Media Hash-Dependent Watermarking Against Protocol Attacks
A common way of resisting protocol attacks is to employ cryptographic techniques so that provable security can be retained. However, some desired requirements of watermarking such...
Chun-Shien Lu, Chia-Mu Yu
WIMOB
2008
IEEE
14 years 1 months ago
Securing Dynamic Home Agent Address Discovery with Cryptographically Generated Addresses and RSA Signatures
With Dynamic Home Agent Address Discovery (DHAAD), as specified in Mobile IPv6, a Mobile Node can discover the address of a suitable Home Agent on the home link. However, DHAAD suf...
Christian Bauer, Max Ehammer