Sciweavers

7 search results - page 2 / 2
» A gesture-based authentication scheme for untrusted public t...
Sort
View
PERCOM
2005
ACM
14 years 5 months ago
Security Parallels between People and Pervasive Devices
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
Stephen A. Weis
PKC
2009
Springer
129views Cryptology» more  PKC 2009»
13 years 10 months ago
Zero-Knowledge Proofs with Witness Elimination
Abstract. Zero-knowledge proofs with witness elimination are protocols that enable a prover to demonstrate knowledge of a witness to the verifier that accepts the interaction prov...
Aggelos Kiayias, Hong-Sheng Zhou