Sciweavers

1573 search results - page 37 / 315
» Strong User Authentication
Sort
View
SPW
2000
Springer
14 years 2 months ago
Users and Trust in Cyberspace
The underlying belief and knowledge models assumed by various kinds of authentication protocols have been studied for well over 10 years now. On the other hand, the related questio...
Pekka Nikander, Kristiina Karvonen
WOA
2003
14 years 8 days ago
Agents Ownership Setting by User Fingerprints
— Agent ownership is a difficult task that touches legal domain. Agent ownership implies that a specific person or organization (the owner) is responsible for the agent’s act...
Salvatore Vitabile, Giovanni Pilato, Vincenzo Cont...
PERCOM
2008
ACM
14 years 10 months ago
Towards Robust Low Cost Authentication for Pervasive Devices
Low cost devices such as RFIDs, sensor network nodes, and smartcards are crucial for building the next generation pervasive and ubiquitous networks. The inherent power and footpri...
Erdinç Öztürk, Ghaith Hammouri, B...
ACNS
2009
Springer
168views Cryptology» more  ACNS 2009»
14 years 5 months ago
Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol
Abstract. In the paper “Stronger Security of Authenticated Key Exchange” [1,2], a new security model for authenticated key exchange protocols (eCK) is proposed. The new model i...
Cas J. F. Cremers
MLMI
2005
Springer
14 years 4 months ago
Can Chimeric Persons Be Used in Multimodal Biometric Authentication Experiments?
Combining multiple information sources, typically from several data streams is a very promising approach, both in experiments and to some extents in various real-life applications....
Norman Poh, Samy Bengio