Sciweavers

1490 search results - page 44 / 298
» The Logic of Authentication Protocols
Sort
View
CCS
2008
ACM
13 years 10 months ago
A fast real-time memory authentication protocol
We propose a new real-time authentication scheme for memory. As in previous proposals the scheme uses a Merkle tree to guarantee dynamic protection of memory. We use the universal...
Yin Hu, Ghaith Hammouri, Berk Sunar
PKC
2007
Springer
135views Cryptology» more  PKC 2007»
14 years 2 months ago
A Direct Anonymous Attestation Scheme for Embedded Devices
Abstract. Direct anonymous attestation (DAA) is an anonymous authentication scheme adopted by the Trusted Computing Group in its specifications for trusted computing platforms. Th...
He Ge, Stephen R. Tate
WSNA
2003
ACM
14 years 2 months ago
Fast authenticated key establishment protocols for self-organizing sensor networks
In this paper, we consider efficient authenticated key This work may not be copied or reproduced in whole or in part for any commercial purpose. Permission to copy in whole or in...
Qiang Huang, Johnas Cukier, Hisashi Kobayashi, Bed...
PR
2006
167views more  PR 2006»
13 years 8 months ago
Database, protocols and tools for evaluating score-level fusion algorithms in biometric authentication
Fusing the scores of several biometric systems is a very promising approach to improve the overall system's accuracy. Despite many works in the literature, it is surprising t...
Norman Poh, Samy Bengio
EUROPKI
2009
Springer
13 years 6 months ago
A Secure and Efficient Authenticated Diffie-Hellman Protocol
The Exponential Challenge Response (XRC) and Dual Exponential Challenge Response (DCR) signature schemes are the building blocks of the HMQV protocol. We propose a complementary an...
Augustin P. Sarr, Philippe Elbaz-Vincent, Jean-Cla...