Sciweavers

632 search results - page 8 / 127
» Two Facets of Authentication
Sort
View
MP
2010
103views more  MP 2010»
13 years 8 months ago
Relations between facets of low- and high-dimensional group problems
In this paper, we introduce an operation that creates families of facet-defining inequalities for highdimensional infinite group problems using facet-defining inequalities of l...
Santanu S. Dey, Jean-Philippe P. Richard
MP
2006
81views more  MP 2006»
13 years 9 months ago
Almost all webs are not rank-perfect
Graphs with circular symmetry, called webs, are relevant w.r.t. describing the stable set polytopes of two larger graph classes, quasi-line graphs [8,12] and claw-free graphs [7,8]...
Arnaud Pêcher, Annegret Wagler
CTRSA
2006
Springer
129views Cryptology» more  CTRSA 2006»
14 years 1 months ago
An Optimal Non-interactive Message Authentication Protocol
Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SASbased non-interactive message aut...
Sylvain Pasini, Serge Vaudenay
SEC
2007
13 years 11 months ago
Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols
In this paper, we analyze the security vulnerabilities of two ultra-lightweight RFID mutual authentication protocols: LMAP and M2 AP, which are recently proposed by Peris-Lopez et ...
Tieyan Li, Guilin Wang
CTRSA
2005
Springer
72views Cryptology» more  CTRSA 2005»
14 years 3 months ago
Proofs for Two-Server Password Authentication
Traditional password-based authentication and key-exchange protocols suffer from the simple fact that a single server stores the sensitive user password. In practice, when such a ...
Michael Szydlo, Burton S. Kaliski Jr.