We show how to design secure authentication protocols for a non-standard class of scenarios. In these authentication is not bootstrapped from a PKI, shared secrets or trusted thir...
We present a secure e-commerce architecture that is resistant to client compromise and man-in-the-middle attacks on SSL. To this end, we propose several security protocols that us...
We explore a new direction towards solving the identity authentication problem in RFID systems. We break the RFID authentication process into two main problems: message authenticat...
A novel protocol is proposed to address the problem of user authentication to smartcards using biometric authentication instead of the usual PIN. The protocol emulates expensive Ma...
Stefano Bistarelli, Stefano Frassi, Anna Vaccarell...
abstract February 6, 2004 Security protocols typically employ an authentication phase followed by a protected data exchange. In some cases, such TLS, these two phases are tightly ...