Sciweavers

ICICS
2010
Springer
13 years 10 months ago
Efficient Authentication for Mobile and Pervasive Computing
With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of su...
Basel Alomair, Radha Poovendran
IJNSEC
2006
96views more  IJNSEC 2006»
14 years 13 days ago
Off-line Password Guessing Attack on an Efficient Key Agreement Protocol for Secure Authentication
In 2004, Kim, Huh, Hwang and Lee proposed an efficient key agreement protocol for secure authentication. In this paper, we shall show that their proposed protocol cannot resist th...
Rongxing Lu, Zhenfu Cao
EVOTING
2004
113views Hardware» more  EVOTING 2004»
14 years 1 months ago
E-Voting and Biometric Systems
: As e-Voting gains more importance while practicable solutions are being implemented, more questions arise concerning alternative possibilities for a secure and feasible authentic...
Sonja Hof
ASIACRYPT
2001
Springer
14 years 4 months ago
Secure Human Identification Protocols
One interesting and important challenge for the cryptologic community is that of providing secure authentication and identification for unassisted humans. There are a range of prot...
Nicholas J. Hopper, Manuel Blum
ICSOC
2009
Springer
14 years 5 months ago
End-to-End Security for Enterprise Mashups
Abstract. Mashups are gaining momentum as a means to develop situational Web applications by combining different resources (services, data feeds) and user interfaces. In enterpris...
Florian Rosenberg, Rania Khalaf, Matthew J. Duftle...
SIBGRAPI
2003
IEEE
14 years 5 months ago
Secure Authentication Watermarking for Binary Images
Abstract. Authentication watermarking is a hidden data inserted into an image, in order to detect any alterations. It seems to be almost impossible to design a really secure authen...
Hae Yong Kim, Amir Afif
SAINT
2003
IEEE
14 years 5 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta