Sciweavers

1573 search results - page 29 / 315
» Strong User Authentication
Sort
View
FTDCS
2003
IEEE
14 years 4 months ago
Adopting Redundancy Techniques for Multicast Stream Authentication
Various schemes have been proposed to achieve strong authenticationof streamed data in a lossy network by means of “light” digital signatures. Such techniques perform a strong...
Tommaso Cucinotta, Gabriele Cecchetti, Gianluca Fe...
CRYPTO
2005
Springer
113views Cryptology» more  CRYPTO 2005»
14 years 4 months ago
Secure Communications over Insecure Channels Based on Short Authenticated Strings
Abstract. We propose a way to establish peer-to-peer authenticated communications over an insecure channel by using an extra channel which can authenticate very short strings, e.g....
Serge Vaudenay
ICSNC
2007
IEEE
14 years 5 months ago
Using the mobile phone as a security token for unified authentication
- The number of different identities and credentials used for authentication towards services on the Internet has increased beyond the manageable. Still, the most common authentica...
Steffen Hallsteinsen, Ivar Jørstad, Do Van ...
ICCTA
2007
IEEE
14 years 5 months ago
Modeling Time-Varying Population for Biometric Authentication
Population size plays a major role in determining the performance of any biometric authentication system, particularly when such systems are used for civilian applications. In thi...
Vandana Roy, C. V. Jawahar
CSREASAM
2008
14 years 10 days ago
Password Entry Scheme Resistant to Eavesdropping
- We propose an authentication scheme resistant to eavesdropping attacks. Users select an alphanumeric password with a length of 9-15 symbols. They can use this password in the tra...
Bogdan Hoanca, Kenrick J. Mock