Sciweavers

397 search results - page 2 / 80
» Secure Authentication Protocols Resistant to Guessing Attack...
Sort
View
CTRSA
2001
Springer
122views Cryptology» more  CTRSA 2001»
13 years 12 months ago
Password Authentication Using Multiple Servers
Safe long-term storage of user private keys is a problem in client/server systems. The problem can be addressed with a roaming system that retrieves keys on demand from remote cred...
David P. Jablon
EUC
2007
Springer
13 years 11 months ago
An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks
Traditional cryptographic primitives are not supported on low-cost RFID tags since, at most, 4K gates can be devoted to securityrelated tasks. Despite this, there are a vast number...
Pedro Peris-Lopez, Julio César Herná...
SOUPS
2009
ACM
14 years 1 months ago
Educated guess on graphical authentication schemes: vulnerabilities and countermeasures
This paper investigate security of graphical authentication tokens against educated guess attacks. Results of two user studies indicate that, if we use original photos as authenti...
Eiji Hayashi, Jason Hong, Nicolas Christin
FC
2010
Springer
169views Cryptology» more  FC 2010»
13 years 10 months ago
A Formal Approach for Automated Reasoning about Off-Line and Undetectable On-Line Guessing
Abstract. Starting from algebraic properties that enable guessing lowentropy secrets, we formalize guessing rules for symbolic verification. The rules are suited for both off-line ...
Bogdan Groza, Marius Minea
JCSS
2006
102views more  JCSS 2006»
13 years 7 months ago
Password-based authentication and key distribution protocols with perfect forward secrecy
In an open networking environment, a workstation usually needs to identify its legal users for providing its services. Kerberos provides an efficient approach whereby a trusted th...
Hung-Min Sun, Her-Tyan Yeh