Sciweavers

1490 search results - page 17 / 298
» The Logic of Authentication Protocols
Sort
View
124
Voted
IANDC
2008
84views more  IANDC 2008»
15 years 2 months ago
Authenticating ad hoc networks by comparison of short digests
We show how to design secure authentication protocols for a non-standard class of scenarios. In these authentication is not bootstrapped from a PKI, shared secrets or trusted thir...
L. H. Nguyen, A. W. Roscoe
131
Voted
IEEEARES
2008
IEEE
15 years 10 months ago
Towards Secure E-Commerce Based on Virtualization and Attestation Techniques
We present a secure e-commerce architecture that is resistant to client compromise and man-in-the-middle attacks on SSL. To this end, we propose several security protocols that us...
Frederic Stumpf, Claudia Eckert, Shane Balfe
158
Voted
JCS
2011
156views more  JCS 2011»
14 years 10 months ago
Securing low-cost RFID systems: An unconditionally secure approach
We explore a new direction towards solving the identity authentication problem in RFID systems. We break the RFID authentication process into two main problems: message authenticat...
Basel Alomair, Loukas Lazos, Radha Poovendran
135
Voted
AVBPA
2005
Springer
256views Biometrics» more  AVBPA 2005»
15 years 9 months ago
MOC via TOC Using a Mobile Agent Framework
A novel protocol is proposed to address the problem of user authentication to smartcards using biometric authentication instead of the usual PIN. The protocol emulates expensive Ma...
Stefano Bistarelli, Stefano Frassi, Anna Vaccarell...
110
Voted
SPW
2004
Springer
15 years 9 months ago
Authentication Components: Engineering Experiences and Guidelines
abstract February 6, 2004 Security protocols typically employ an authentication phase followed by a protected data exchange. In some cases, such TLS, these two phases are tightly ...
Pasi Eronen, Jari Arkko