Sciweavers

632 search results - page 31 / 127
» Two Facets of Authentication
Sort
View
CISC
2007
Springer
98views Cryptology» more  CISC 2007»
14 years 3 months ago
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM
Abstract. The Trusted Computing Group (TCG) defines the specifications for the Trusted Platform Module (TPM) and corresponding trust mechanisms that allow a TPM-enabled platform ...
Yongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffr...
CTRSA
2008
Springer
172views Cryptology» more  CTRSA 2008»
13 years 10 months ago
CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
We propose two constructions of chosen-ciphertext secure identity-based encryption (IBE) schemes. Our schemes have a security proof in the standard model, yet they offer performan...
Eike Kiltz, Yevgeniy Vahlis
IJNSEC
2008
106views more  IJNSEC 2008»
13 years 9 months ago
Comments on "Improved Efficient Remote User Authentication Schemes"
Recently, Tian et al. presented an article, in which they discussed some security weaknesses of Yoon et al.'s scheme and subsequently proposed two "improved" scheme...
Manik Lal Das
CISC
2009
Springer
154views Cryptology» more  CISC 2009»
13 years 6 months ago
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication
In a selective private function evaluation (SPFE) protocol, the client privately computes some predefined function on his own input and on m out of server's n database element...
Helger Lipmaa, Bingsheng Zhang
IPPS
2007
IEEE
14 years 3 months ago
Authentication in Reprogramming of Sensor Networks for Mote Class Adversaries
Reprogramming is an essential service for wireless sensor networks. Authenticating reprogramming process is important as sensors need to verify that the code image is truly from a...
Limin Wang, Sandeep S. Kulkarni