Sciweavers

1573 search results - page 56 / 315
» Strong User Authentication
Sort
View
ACSAC
2008
IEEE
14 years 5 months ago
pwdArmor: Protecting Conventional Password-Based Authentications
pwdArmor is a framework for fortifying conventional password-based authentications. Many password protocols are performed within an encrypted tunnel (e.g., TLS) to prevent the exp...
Timothy W. van der Horst, Kent E. Seamons
IJNSEC
2008
81views more  IJNSEC 2008»
13 years 11 months ago
A Self-Concealing Mechanism for Authentication of Portable Communication Systems
The challenge-response technique is widely adapted for authentication of portable communication systems. For authentication the user can prove his/her identity via a secret shared...
Wei-Bin Lee, Chang-Kuo Yeh
TC
2008
13 years 11 months ago
Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices
In an attempt to expand Public Key Infrastructure (PKI) usage to a ubiquitous and mobile computing environment, we found that the deployment of the PKI on a resource-constrained de...
Ki-Woong Park, Sang Seok Lim, Kyu Ho Park
USS
2008
14 years 1 months ago
Panic Passwords: Authenticating under Duress
Panic passwords allow a user to signal duress during authentication. We show that the well-known model of giving a user two passwords, a `regular' and a `panic' password...
Jeremy Clark, Urs Hengartner
HOTDEP
2008
114views Hardware» more  HOTDEP 2008»
14 years 1 months ago
Pretty Good Packet Authentication
Internet addresses are routinely being used to infer the identity of persons who send offending traffic
Andreas Haeberlen, Rodrigo Rodrigues, P. Krishna G...