Sciweavers

1656 search results - page 14 / 332
» Secure Computation Without Authentication
Sort
View
ACSAC
2008
IEEE
14 years 4 months ago
PAS: Predicate-Based Authentication Services Against Powerful Passive Adversaries
Securely authenticating a human user without assistance from any auxiliary device in the presence of powerful passive adversaries is an important and challenging problem. Passive ...
Xiaole Bai, Wenjun Gu, Sriram Chellappan, Xun Wang...
MUE
2007
IEEE
113views Multimedia» more  MUE 2007»
14 years 3 months ago
An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards
In 2003, Yang, Chang, and Hwang proposed an enhanced scheme of Peyravivan-Zunic’s password authentication scheme by using the Diffie-Hellman scheme. Later, Yoon, Ryu, and Yoo de...
Chin-Chen Chang, Hao-Chuan Tsai, Yi-Hui Chen
CSREASAM
2006
13 years 11 months ago
A New Secure Authentication Scheme Based Threshold ECDSA For Wireless Sensor Network
- Security is an important issue for Wireless Sensor Network (WSN), especially for security-sensitive application. In this paper, we address secure authentication problems in WSN. ...
Hao Wang, Zhongfu Wu, Xin Tan
CCS
1993
ACM
14 years 1 months ago
On Simple and Secure Key Distribution
Many recent research e orts in computer security focus on constructing provably secure authentication protocols. Although many of the resulting protocols rely on the a priori secu...
Gene Tsudik, Els Van Herreweghen
ICPADS
2005
IEEE
14 years 3 months ago
UNIDES: An Efficient Real-Time System to Detect and Block Unauthorized Internet Access
In the audit process of Internet activities of users in a local area network, one of the most difficult problems is the problem of source authentication i.e. establishing securely...
Yusuf Uzunay, Kemal Bicakci