Sciweavers

1656 search results - page 77 / 332
» Secure Computation Without Authentication
Sort
View
ICCSA
2005
Springer
15 years 8 months ago
Attacks on Port Knocking Authentication Mechanism
Abstract. Research in authentication mechanisms has led to the design and development of new schemes. The security provided by these procedures must be reviewed and analyzed before...
Antonio Izquierdo Manzanares, Joaquín Torre...
120
Voted
INFORMATICALT
2008
168views more  INFORMATICALT 2008»
15 years 2 months ago
A Pairing-Based User Authentication Scheme for Wireless Clients with Smart Cards
With rapid growth of mobile wireless networks, handheld devices are popularly used by people and many mobile applications have been rapidly developed. Considering the limited compu...
Yuh-Min Tseng, Tsu-Yang Wu, Jui-Di Wu
118
Voted
ACSAC
2007
IEEE
15 years 9 months ago
Bonsai: Balanced Lineage Authentication
The provenance of a piece of data is of utility to a wide range of applications. Its availability can be drastically increased by automatically collecting lineage information duri...
Ashish Gehani, Ulf Lindqvist
FC
2000
Springer
83views Cryptology» more  FC 2000»
15 years 6 months ago
Secret Key Authentication with Software-Only Verification
Abstract Two protocols for authentication based on symmetric key cryptography are described, where the verifier can be implemented in software completely, without the need for secu...
Jaap-Henk Hoepman
JCP
2006
118views more  JCP 2006»
15 years 2 months ago
A Method of An Anonymous Authentication For Flat-rate Service
As the ubiquitous society spreads rapidly, various private information circulates in large quantities. Information increases explosively in recent years, the importance of privacy ...
Yoshio Kakizaki, Hiroshi Yamamoto, Hidekazu Tsuji