Sciweavers

122 search results - page 1 / 25
» Authentication and Delegation with Smart-cards
Sort
View
WWW
2006
ACM
14 years 6 months ago
Strong authentication in web proxies
In this paper we present a way to integrate web proxies with smart card based authentication systems. Categories and Subject Descriptors K.6.5 [Security and Protection]: Authentic...
Domenico Rotiroti
IJNSEC
2007
115views more  IJNSEC 2007»
13 years 5 months ago
Novel Secure Communication Protocol for Conditional Access System
A protocol for secure communication between set-top box and smart card in conditional access system is proposed. The proposed protocol uses the Schnorr identification scheme to a...
Yongliang Liu, Xiaolin Yang, Hongxun Yao, Wen Gao
BIOSIG
2003
107views Biometrics» more  BIOSIG 2003»
13 years 7 months ago
Authentication Framework for Smart Cards
: This paper introduces a generalized authentication framework for smart he framework abstracts the authentication services on the card and allows flexible configuration of authent...
Apostol Vassilev, Michael Hutchinson
AMC
2005
131views more  AMC 2005»
13 years 5 months ago
A user friendly remote authentication scheme with smart cards against impersonation attacks
In 2000, Sun proposed an efficient remote user authentication scheme using smart cards without requiring a password table. However, the password of a user is an un-human lengthy p...
Chien-Lung Hsu
IJNSEC
2010
143views more  IJNSEC 2010»
13 years 13 days ago
A New Secure Remote User Authentication Scheme with Smart Cards
Remote user authentication scheme is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. These types of schemes ...
Manoj Kumar