Sciweavers

124 search results - page 1 / 25
» Attacks on the DECT Authentication Mechanisms
Sort
View
CTRSA
2009
Springer
142views Cryptology» more  CTRSA 2009»
13 years 11 months ago
Attacks on the DECT Authentication Mechanisms
Digital Enhanced Cordless Telecommunications (DECT) is a standard for connecting cordless telephones to a fixed telecommunications network over a short range. The cryptographic al...
Stefan Lucks, Andreas Schuler, Erik Tews, Ralf-Phi...
IJNSEC
2010
143views more  IJNSEC 2010»
12 years 11 months ago
A New Secure Remote User Authentication Scheme with Smart Cards
Remote user authentication scheme is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. These types of schemes ...
Manoj Kumar
ICCSA
2005
Springer
13 years 10 months ago
Attacks on Port Knocking Authentication Mechanism
Abstract. Research in authentication mechanisms has led to the design and development of new schemes. The security provided by these procedures must be reviewed and analyzed before...
Antonio Izquierdo Manzanares, Joaquín Torre...
SOUPS
2009
ACM
13 years 11 months ago
New directions in multisensory authentication
This paper discusses and evaluates two novel multisensory user authentication mechanisms aimed at preventing observation attacks. These mechanisms improve the usability of our pre...
Madoka Hasegawa, Nicolas Christin, Eiji Hayashi
IJNSEC
2011
167views more  IJNSEC 2011»
12 years 11 months ago
New Real Time Multicast Authentication Protocol
Multicast gives professional large-scale content distribution by providing an efficient transport mechanism for one-to-many and many-to-many communications. There is a number of s...
Riham Abdellatif, Heba Kamal Aslan, Salwa H. Elram...