Sciweavers

1490 search results - page 73 / 298
» The Logic of Authentication Protocols
Sort
View
119
Voted
SASN
2006
ACM
15 years 9 months ago
Seven cardinal properties of sensor network broadcast authentication
We investigate the design space of sensor network broadcast authentication. We show that prior approaches can be organized based on a taxonomy of seven fundamental proprieties, su...
Mark Luk, Adrian Perrig, Bram Whillock
111
Voted
IEEEIAS
2008
IEEE
15 years 10 months ago
Abusing SIP Authentication
The recent and massive deployment of Voice over IP infrastructures had raised the importance of the VoIP security and more precisely of the underlying signalisation protocol SIP. ...
Humberto J. Abdelnur, Tigran Avanesov, Michaë...
148
Voted
WIRN
2005
Springer
15 years 9 months ago
An Automatic Feature Based Face Authentication System,
Abstract. In this paper a fully automatic face verification system is presented. A face is characterized by a vector (jet) of coefficients determined applying a bank of Gabor fil...
Stefano Arca, Paola Campadelli, Elena Casiraghi, R...
137
Voted
CTRSA
2007
Springer
147views Cryptology» more  CTRSA 2007»
15 years 7 months ago
Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement
Privacy concerns in many aspects of electronic communication trigger the need to re-examine
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
165
Voted
FC
2007
Springer
125views Cryptology» more  FC 2007»
15 years 9 months ago
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
Task-specific groups are often formed in an ad-hoc manner within big structures, like companies. Take the following typical scenario: A high rank manager decides that a task force...
Yvo Desmedt, Tanja Lange, Mike Burmester