Sciweavers

631 search results - page 1 / 127
» Strong Authentication and Strong Integrity (SASI) Is Not Tha...
Sort
View
RFIDSEC
2010
13 years 5 months ago
Strong Authentication and Strong Integrity (SASI) Is Not That Strong
In this work, we present a practical passive attack on SASI, an ultra-lightweight mutual authentication protocol for RFID. This attack can be used to reveal with overwhelming proba...
Gildas Avoine, Xavier Carpent, Benjamin Martin 000...
WWW
2006
ACM
14 years 8 months ago
Strong authentication in web proxies
In this paper we present a way to integrate web proxies with smart card based authentication systems. Categories and Subject Descriptors K.6.5 [Security and Protection]: Authentic...
Domenico Rotiroti
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
11 years 10 months ago
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
Abstract. An unresolved problem in research on authenticated key exchange (AKE) is to construct a secure protocol against advanced attacks such as key compromise impersonation and ...
Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Ka...
IJNSEC
2006
122views more  IJNSEC 2006»
13 years 7 months ago
A Hash-based Strong Password Authentication Protocol with User Anonymity
Password authentication protocols range from complex public-key cryptosystems to simple hash-based password authentication schemes. One common feature of these protocols is that t...
Kumar V. Mangipudi, Rajendra S. Katti
ACISP
2008
Springer
14 years 1 months ago
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy
The standard solution for mutual authentication between human users and servers on the Internet is to execute a TLS handshake during which the server authenticates using a X.509 ce...
Sebastian Gajek, Mark Manulis, Jörg Schwenk