Sciweavers

1490 search results - page 117 / 298
» The Logic of Authentication Protocols
Sort
View
CORR
2006
Springer
115views Education» more  CORR 2006»
13 years 9 months ago
New security and control protocol for VoIP based on steganography and digital watermarking
In this paper new, lightweight security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF's (Internet Engi...
Wojciech Mazurczyk, Zbigniew Kotulski
CCS
2009
ACM
14 years 3 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
ESORICS
2007
Springer
14 years 3 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
CCS
2006
ACM
14 years 21 days ago
Fortifying password authentication in integrated healthcare delivery systems
Integrated Delivery Systems (IDSs) now become a primary means of care provision in healthcare domain. However, existing password systems (under either the single-server model or t...
Yanjiang Yang, Robert H. Deng, Feng Bao
PKC
2000
Springer
132views Cryptology» more  PKC 2000»
14 years 16 days ago
The Composite Discrete Logarithm and Secure Authentication
For the two last decades, electronic authentication has been an important topic. The first applications were digital signatures to mimic handwritten signatures for digital document...
David Pointcheval